Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/fis-gtm-6.3-007/sr_i386/auto_zlink.c Examining data/fis-gtm-6.3-007/sr_i386/auto_zlink.h Examining data/fis-gtm-6.3-007/sr_i386/cmerrors_ctl.c Examining data/fis-gtm-6.3-007/sr_i386/cmierrors_ctl.c Examining data/fis-gtm-6.3-007/sr_i386/emit_code.c Examining data/fis-gtm-6.3-007/sr_i386/emit_code.h Examining data/fis-gtm-6.3-007/sr_i386/find_line_call.c Examining data/fis-gtm-6.3-007/sr_i386/gdeerrors_ctl.c Examining data/fis-gtm-6.3-007/sr_i386/incr_link.c Examining data/fis-gtm-6.3-007/sr_i386/make_cimode.c Examining data/fis-gtm-6.3-007/sr_i386/make_dmode.c Examining data/fis-gtm-6.3-007/sr_i386/masscomp.h Examining data/fis-gtm-6.3-007/sr_i386/merrors_ansi.h Examining data/fis-gtm-6.3-007/sr_i386/merrors_ctl.c Examining data/fis-gtm-6.3-007/sr_i386/obj_file.c Examining data/fis-gtm-6.3-007/sr_i386/ttt.c Examining data/fis-gtm-6.3-007/sr_i386/zbreaksp.h Examining data/fis-gtm-6.3-007/sr_linux/caller_id.c Examining data/fis-gtm-6.3-007/sr_linux/gtm_getenv.c Examining data/fis-gtm-6.3-007/sr_linux/hugetlbfs_overrides.c Examining data/fis-gtm-6.3-007/sr_linux/inst_flush.c Examining data/fis-gtm-6.3-007/sr_linux/release_name.h Examining data/fis-gtm-6.3-007/sr_port/act_in_gvt.c Examining data/fis-gtm-6.3-007/sr_port/actuallist.c Examining data/fis-gtm-6.3-007/sr_port/add_atom.c Examining data/fis-gtm-6.3-007/sr_port/add_inter.h Examining data/fis-gtm-6.3-007/sr_port/adjust_frames.c Examining data/fis-gtm-6.3-007/sr_port/advancewindow.c Examining data/fis-gtm-6.3-007/sr_port/advancewindow.h Examining data/fis-gtm-6.3-007/sr_port/aio_shim.h Examining data/fis-gtm-6.3-007/sr_port/alias.h Examining data/fis-gtm-6.3-007/sr_port/alias_funcs.c Examining data/fis-gtm-6.3-007/sr_port/alloc_reg.c Examining data/fis-gtm-6.3-007/sr_port/alloc_reg.h Examining data/fis-gtm-6.3-007/sr_port/anticipatory_freeze.h Examining data/fis-gtm-6.3-007/sr_port/arit.h Examining data/fis-gtm-6.3-007/sr_port/asc2i.c Examining data/fis-gtm-6.3-007/sr_port/asc_hex2i.c Examining data/fis-gtm-6.3-007/sr_port/aswp.h Examining data/fis-gtm-6.3-007/sr_port/azl_geturxlab.c Examining data/fis-gtm-6.3-007/sr_port/azl_geturxrtn.c Examining data/fis-gtm-6.3-007/sr_port/backup_block.c Examining data/fis-gtm-6.3-007/sr_port/base_frame.c Examining data/fis-gtm-6.3-007/sr_port/bg_update.h Examining data/fis-gtm-6.3-007/sr_port/bit_clear.c Examining data/fis-gtm-6.3-007/sr_port/bit_clear.h Examining data/fis-gtm-6.3-007/sr_port/bit_set.c Examining data/fis-gtm-6.3-007/sr_port/bit_set.h Examining data/fis-gtm-6.3-007/sr_port/bm_find_blk.c Examining data/fis-gtm-6.3-007/sr_port/bm_getfree.c Examining data/fis-gtm-6.3-007/sr_port/bm_getfree.h Examining data/fis-gtm-6.3-007/sr_port/bm_setmap.c Examining data/fis-gtm-6.3-007/sr_port/bm_update.h Examining data/fis-gtm-6.3-007/sr_port/bml_busy.c Examining data/fis-gtm-6.3-007/sr_port/bml_find_busy.c Examining data/fis-gtm-6.3-007/sr_port/bml_find_busy.h Examining data/fis-gtm-6.3-007/sr_port/bml_find_free.c Examining data/fis-gtm-6.3-007/sr_port/bml_free.c Examining data/fis-gtm-6.3-007/sr_port/bml_init.c Examining data/fis-gtm-6.3-007/sr_port/bml_newmap.c Examining data/fis-gtm-6.3-007/sr_port/bml_recycled.c Examining data/fis-gtm-6.3-007/sr_port/bml_status_check.c Examining data/fis-gtm-6.3-007/sr_port/bml_status_check.h Examining data/fis-gtm-6.3-007/sr_port/bmm_find_free.c Examining data/fis-gtm-6.3-007/sr_port/bmm_find_free.h Examining data/fis-gtm-6.3-007/sr_port/bmm_init.c Examining data/fis-gtm-6.3-007/sr_port/bool_expr.c Examining data/fis-gtm-6.3-007/sr_port/break.h Examining data/fis-gtm-6.3-007/sr_port/bt_get.c Examining data/fis-gtm-6.3-007/sr_port/bt_init.c Examining data/fis-gtm-6.3-007/sr_port/bt_malloc.c Examining data/fis-gtm-6.3-007/sr_port/bt_put.c Examining data/fis-gtm-6.3-007/sr_port/bt_refresh.c Examining data/fis-gtm-6.3-007/sr_port/buddy_list.c Examining data/fis-gtm-6.3-007/sr_port/buddy_list.h Examining data/fis-gtm-6.3-007/sr_port/bx_boollit.c Examining data/fis-gtm-6.3-007/sr_port/bx_boolop.c Examining data/fis-gtm-6.3-007/sr_port/bx_relop.c Examining data/fis-gtm-6.3-007/sr_port/bx_tail.c Examining data/fis-gtm-6.3-007/sr_port/cache.h Examining data/fis-gtm-6.3-007/sr_port/cache_cleanup.c Examining data/fis-gtm-6.3-007/sr_port/cache_cleanup.h Examining data/fis-gtm-6.3-007/sr_port/cache_get.c Examining data/fis-gtm-6.3-007/sr_port/cache_init.c Examining data/fis-gtm-6.3-007/sr_port/cache_put.c Examining data/fis-gtm-6.3-007/sr_port/cache_stats.c Examining data/fis-gtm-6.3-007/sr_port/cache_table_rebuild.c Examining data/fis-gtm-6.3-007/sr_port/cachectl.h Examining data/fis-gtm-6.3-007/sr_port/cacheflush.c Examining data/fis-gtm-6.3-007/sr_port/cacheflush.h Examining data/fis-gtm-6.3-007/sr_port/caller_id.c Examining data/fis-gtm-6.3-007/sr_port/caller_id.h Examining data/fis-gtm-6.3-007/sr_port/callg.h Examining data/fis-gtm-6.3-007/sr_port/callg_signal.c Examining data/fis-gtm-6.3-007/sr_port/ccp.h Examining data/fis-gtm-6.3-007/sr_port/ccp_cluster_lock_wake.h Examining data/fis-gtm-6.3-007/sr_port/ccpact.h Examining data/fis-gtm-6.3-007/sr_port/ccpact_tab.h Examining data/fis-gtm-6.3-007/sr_port/cdb_sc.h Examining data/fis-gtm-6.3-007/sr_port/cdb_sc_table.h Examining data/fis-gtm-6.3-007/sr_port/cdbg_dump.c Examining data/fis-gtm-6.3-007/sr_port/cdbg_dump.h Examining data/fis-gtm-6.3-007/sr_port/ceil_log2.c Examining data/fis-gtm-6.3-007/sr_port/ceprep_file.c Examining data/fis-gtm-6.3-007/sr_port/cert_blk.c Examining data/fis-gtm-6.3-007/sr_port/cert_blk.h Examining data/fis-gtm-6.3-007/sr_port/cg_var.c Examining data/fis-gtm-6.3-007/sr_port/cg_var.h Examining data/fis-gtm-6.3-007/sr_port/cgp.h Examining data/fis-gtm-6.3-007/sr_port/change_reg.c Examining data/fis-gtm-6.3-007/sr_port/change_reg.h Examining data/fis-gtm-6.3-007/sr_port/chktchain.c Examining data/fis-gtm-6.3-007/sr_port/cli_get_str_ele.c Examining data/fis-gtm-6.3-007/sr_port/cli_port.c Examining data/fis-gtm-6.3-007/sr_port/cliif.h Examining data/fis-gtm-6.3-007/sr_port/cmd.c Examining data/fis-gtm-6.3-007/sr_port/cmd.h Examining data/fis-gtm-6.3-007/sr_port/cmd_qlf.h Examining data/fis-gtm-6.3-007/sr_port/cmi.h Examining data/fis-gtm-6.3-007/sr_port/cmidef.h Examining data/fis-gtm-6.3-007/sr_port/cmmdef.h Examining data/fis-gtm-6.3-007/sr_port/code_address_type.h Examining data/fis-gtm-6.3-007/sr_port/code_gen.c Examining data/fis-gtm-6.3-007/sr_port/coerce.c Examining data/fis-gtm-6.3-007/sr_port/collseq.c Examining data/fis-gtm-6.3-007/sr_port/collseq.h Examining data/fis-gtm-6.3-007/sr_port/comline.h Examining data/fis-gtm-6.3-007/sr_port/common_startup_init.c Examining data/fis-gtm-6.3-007/sr_port/common_startup_init.h Examining data/fis-gtm-6.3-007/sr_port/comp_esc.h Examining data/fis-gtm-6.3-007/sr_port/comp_fini.c Examining data/fis-gtm-6.3-007/sr_port/comp_indr.c Examining data/fis-gtm-6.3-007/sr_port/comp_init.c Examining data/fis-gtm-6.3-007/sr_port/compile_pattern.c Examining data/fis-gtm-6.3-007/sr_port/compile_pattern.h Examining data/fis-gtm-6.3-007/sr_port/compiler.h Examining data/fis-gtm-6.3-007/sr_port/compiler_ch.c Examining data/fis-gtm-6.3-007/sr_port/compiler_startup.c Examining data/fis-gtm-6.3-007/sr_port/compswap.h Examining data/fis-gtm-6.3-007/sr_port/copy.h Examining data/fis-gtm-6.3-007/sr_port/copy_stack_frame.c Examining data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c Examining data/fis-gtm-6.3-007/sr_port/cre_jnl_file_intrpt_rename.c Examining data/fis-gtm-6.3-007/sr_port/cre_private_code_copy.c Examining data/fis-gtm-6.3-007/sr_port/create_byte_xlate_table.c Examining data/fis-gtm-6.3-007/sr_port/create_dummy_gbldir.c Examining data/fis-gtm-6.3-007/sr_port/create_fatal_error_zshow_dmp.c Examining data/fis-gtm-6.3-007/sr_port/create_fatal_error_zshow_dmp.h Examining data/fis-gtm-6.3-007/sr_port/create_temporaries.c Examining data/fis-gtm-6.3-007/sr_port/create_utf8_xlate_table.c Examining data/fis-gtm-6.3-007/sr_port/crit_wake.h Examining data/fis-gtm-6.3-007/sr_port/cryptdef.h Examining data/fis-gtm-6.3-007/sr_port/ctrlc_handler_dummy.c Examining data/fis-gtm-6.3-007/sr_port/ctrlc_handler_dummy.h Examining data/fis-gtm-6.3-007/sr_port/cvtparm.c Examining data/fis-gtm-6.3-007/sr_port/cvtparm.h Examining data/fis-gtm-6.3-007/sr_port/cvtprot.h Examining data/fis-gtm-6.3-007/sr_port/cvttime.h Examining data/fis-gtm-6.3-007/sr_port/cws_insert.h Examining data/fis-gtm-6.3-007/sr_port/db_auto_upgrade.c Examining data/fis-gtm-6.3-007/sr_port/db_common_init.c Examining data/fis-gtm-6.3-007/sr_port/db_csh_get.c Examining data/fis-gtm-6.3-007/sr_port/db_csh_getn.c Examining data/fis-gtm-6.3-007/sr_port/db_csh_ini.c Examining data/fis-gtm-6.3-007/sr_port/db_csh_ref.c Examining data/fis-gtm-6.3-007/sr_port/dbcertify.c Examining data/fis-gtm-6.3-007/sr_port/dbcertify.h Examining data/fis-gtm-6.3-007/sr_port/dbcertify_base_ch.c Examining data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c Examining data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c Examining data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c Examining data/fis-gtm-6.3-007/sr_port/dbfilop.h Examining data/fis-gtm-6.3-007/sr_port/ddphdr.h Examining data/fis-gtm-6.3-007/sr_port/deferred_events.c Examining data/fis-gtm-6.3-007/sr_port/deferred_events.h Examining data/fis-gtm-6.3-007/sr_port/deferred_events_queue.c Examining data/fis-gtm-6.3-007/sr_port/deferred_events_queue.h Examining data/fis-gtm-6.3-007/sr_port/desired_db_format_set.c Examining data/fis-gtm-6.3-007/sr_port/desired_db_format_set.h Examining data/fis-gtm-6.3-007/sr_port/deviceparameters.c Examining data/fis-gtm-6.3-007/sr_port/deviceparameters.h Examining data/fis-gtm-6.3-007/sr_port/dfa_calc.c Examining data/fis-gtm-6.3-007/sr_port/dm_read.h Examining data/fis-gtm-6.3-007/sr_port/dm_setup.c Examining data/fis-gtm-6.3-007/sr_port/dm_setup.h Examining data/fis-gtm-6.3-007/sr_port/do_indir_do.c Examining data/fis-gtm-6.3-007/sr_port/do_indir_do.h Examining data/fis-gtm-6.3-007/sr_port/do_patalt.c Examining data/fis-gtm-6.3-007/sr_port/do_patfixed.c Examining data/fis-gtm-6.3-007/sr_port/do_patsplit.c Examining data/fis-gtm-6.3-007/sr_port/do_pattern.c Examining data/fis-gtm-6.3-007/sr_port/do_xform.h Examining data/fis-gtm-6.3-007/sr_port/dollar_quit.c Examining data/fis-gtm-6.3-007/sr_port/dollar_quit.h Examining data/fis-gtm-6.3-007/sr_port/dollar_system_init.c Examining data/fis-gtm-6.3-007/sr_port/dollar_system_init.h Examining data/fis-gtm-6.3-007/sr_port/dollar_zlevel.c Examining data/fis-gtm-6.3-007/sr_port/dollar_zlevel.h Examining data/fis-gtm-6.3-007/sr_port/dollarx.c Examining data/fis-gtm-6.3-007/sr_port/dollarx.h Examining data/fis-gtm-6.3-007/sr_port/dpgbldir.c Examining data/fis-gtm-6.3-007/sr_port/dpgbldir.h Examining data/fis-gtm-6.3-007/sr_port/dse.h Examining data/fis-gtm-6.3-007/sr_port/dse_adrec.c Examining data/fis-gtm-6.3-007/sr_port/dse_adstar.c Examining data/fis-gtm-6.3-007/sr_port/dse_all.c Examining data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c Examining data/fis-gtm-6.3-007/sr_port/dse_cache.c Examining data/fis-gtm-6.3-007/sr_port/dse_chng_bhead.c Examining data/fis-gtm-6.3-007/sr_port/dse_chng_fhead.c Examining data/fis-gtm-6.3-007/sr_port/dse_chng_rhead.c Examining data/fis-gtm-6.3-007/sr_port/dse_crit.c Examining data/fis-gtm-6.3-007/sr_port/dse_data.c Examining data/fis-gtm-6.3-007/sr_port/dse_dmp.c Examining data/fis-gtm-6.3-007/sr_port/dse_dmp_fhead.c Examining data/fis-gtm-6.3-007/sr_port/dse_eval.c Examining data/fis-gtm-6.3-007/sr_port/dse_exhaus.c Examining data/fis-gtm-6.3-007/sr_port/dse_exit.c Examining data/fis-gtm-6.3-007/sr_port/dse_exit.h Examining data/fis-gtm-6.3-007/sr_port/dse_f_blk.c Examining data/fis-gtm-6.3-007/sr_port/dse_f_free.c Examining data/fis-gtm-6.3-007/sr_port/dse_f_key.c Examining data/fis-gtm-6.3-007/sr_port/dse_f_reg.c Examining data/fis-gtm-6.3-007/sr_port/dse_fdmp.c Examining data/fis-gtm-6.3-007/sr_port/dse_find_gvt.c Examining data/fis-gtm-6.3-007/sr_port/dse_find_roots.c Examining data/fis-gtm-6.3-007/sr_port/dse_flush.c Examining data/fis-gtm-6.3-007/sr_port/dse_getblk.c Examining data/fis-gtm-6.3-007/sr_port/dse_getki.c Examining data/fis-gtm-6.3-007/sr_port/dse_integ.c Examining data/fis-gtm-6.3-007/sr_port/dse_is_blk_free.c Examining data/fis-gtm-6.3-007/sr_port/dse_is_blk_in.c Examining data/fis-gtm-6.3-007/sr_port/dse_ksrch.c Examining data/fis-gtm-6.3-007/sr_port/dse_lm_blk_free.c Examining data/fis-gtm-6.3-007/sr_port/dse_m_rest.c Examining data/fis-gtm-6.3-007/sr_port/dse_maps.c Examining data/fis-gtm-6.3-007/sr_port/dse_order.c Examining data/fis-gtm-6.3-007/sr_port/dse_over.c Examining data/fis-gtm-6.3-007/sr_port/dse_page.c Examining data/fis-gtm-6.3-007/sr_port/dse_puttime.h Examining data/fis-gtm-6.3-007/sr_port/dse_r_dmp.c Examining data/fis-gtm-6.3-007/sr_port/dse_range.c Examining data/fis-gtm-6.3-007/sr_port/dse_rest.c Examining data/fis-gtm-6.3-007/sr_port/dse_rmrec.c Examining data/fis-gtm-6.3-007/sr_port/dse_rmsb.c Examining data/fis-gtm-6.3-007/sr_port/dse_save.c Examining data/fis-gtm-6.3-007/sr_port/dse_shift.c Examining data/fis-gtm-6.3-007/sr_port/dse_wcreinit.c Examining data/fis-gtm-6.3-007/sr_port/dsefind.h Examining data/fis-gtm-6.3-007/sr_port/dump_lockhist.c Examining data/fis-gtm-6.3-007/sr_port/dump_record.c Examining data/fis-gtm-6.3-007/sr_port/dumptable.c Examining data/fis-gtm-6.3-007/sr_port/dumptable.h Examining data/fis-gtm-6.3-007/sr_port/eb_muldiv.c Examining data/fis-gtm-6.3-007/sr_port/eb_muldiv.h Examining data/fis-gtm-6.3-007/sr_port/ebc_xlat.c Examining data/fis-gtm-6.3-007/sr_port/ebc_xlat.h Examining data/fis-gtm-6.3-007/sr_port/ecode_add.c Examining data/fis-gtm-6.3-007/sr_port/ecode_get.c Examining data/fis-gtm-6.3-007/sr_port/ecode_init.c Examining data/fis-gtm-6.3-007/sr_port/ecode_set.c Examining data/fis-gtm-6.3-007/sr_port/eintr_wrappers.h Examining data/fis-gtm-6.3-007/sr_port/emit_code.c Examining data/fis-gtm-6.3-007/sr_port/emit_code.h Examining data/fis-gtm-6.3-007/sr_port/entryref.c Examining data/fis-gtm-6.3-007/sr_port/err_check.c Examining data/fis-gtm-6.3-007/sr_port/error.h Examining data/fis-gtm-6.3-007/sr_port/error_trap.h Examining data/fis-gtm-6.3-007/sr_port/eval_expr.c Examining data/fis-gtm-6.3-007/sr_port/ex_tail.c Examining data/fis-gtm-6.3-007/sr_port/exfun_frame.c Examining data/fis-gtm-6.3-007/sr_port/exfunc.c Examining data/fis-gtm-6.3-007/sr_port/expr.c Examining data/fis-gtm-6.3-007/sr_port/expratom.c Examining data/fis-gtm-6.3-007/sr_port/expritem.c Examining data/fis-gtm-6.3-007/sr_port/ext2jnl.c Examining data/fis-gtm-6.3-007/sr_port/extern_func.c Examining data/fis-gtm-6.3-007/sr_port/f_ascii.c Examining data/fis-gtm-6.3-007/sr_port/f_data.c Examining data/fis-gtm-6.3-007/sr_port/f_extract.c Examining data/fis-gtm-6.3-007/sr_port/f_find.c Examining data/fis-gtm-6.3-007/sr_port/f_fnumber.c Examining data/fis-gtm-6.3-007/sr_port/f_fnzbitfind.c Examining data/fis-gtm-6.3-007/sr_port/f_fnzbitget.c Examining data/fis-gtm-6.3-007/sr_port/f_fnzbitset.c Examining data/fis-gtm-6.3-007/sr_port/f_fnzbitstr.c Examining data/fis-gtm-6.3-007/sr_port/f_get.c Examining data/fis-gtm-6.3-007/sr_port/f_get1.c Examining data/fis-gtm-6.3-007/sr_port/f_incr.c Examining data/fis-gtm-6.3-007/sr_port/f_justify.c Examining data/fis-gtm-6.3-007/sr_port/f_length.c Examining data/fis-gtm-6.3-007/sr_port/f_mint.c Examining data/fis-gtm-6.3-007/sr_port/f_mint_mstr.c Examining data/fis-gtm-6.3-007/sr_port/f_mstr.c Examining data/fis-gtm-6.3-007/sr_port/f_name.c Examining data/fis-gtm-6.3-007/sr_port/f_next.c Examining data/fis-gtm-6.3-007/sr_port/f_one_mval.c Examining data/fis-gtm-6.3-007/sr_port/f_order.c Examining data/fis-gtm-6.3-007/sr_port/f_order1.c Examining data/fis-gtm-6.3-007/sr_port/f_qlength.c Examining data/fis-gtm-6.3-007/sr_port/f_qsubscript.c Examining data/fis-gtm-6.3-007/sr_port/f_query.c Examining data/fis-gtm-6.3-007/sr_port/f_reverse.c Examining data/fis-gtm-6.3-007/sr_port/f_select.c Examining data/fis-gtm-6.3-007/sr_port/f_stack.c Examining data/fis-gtm-6.3-007/sr_port/f_text.c Examining data/fis-gtm-6.3-007/sr_port/f_translate.c Examining data/fis-gtm-6.3-007/sr_port/f_two_mstrs.c Examining data/fis-gtm-6.3-007/sr_port/f_two_mval.c Examining data/fis-gtm-6.3-007/sr_port/f_view.c Examining data/fis-gtm-6.3-007/sr_port/f_zahandle.c Examining data/fis-gtm-6.3-007/sr_port/f_zatransform.c Examining data/fis-gtm-6.3-007/sr_port/f_zcall.c Examining data/fis-gtm-6.3-007/sr_port/f_zchar.c Examining data/fis-gtm-6.3-007/sr_port/f_zcollate.c Examining data/fis-gtm-6.3-007/sr_port/f_zconvert.c Examining data/fis-gtm-6.3-007/sr_port/f_zdate.c Examining data/fis-gtm-6.3-007/sr_port/f_zgetsyi.c Examining data/fis-gtm-6.3-007/sr_port/f_zjobexam.c Examining data/fis-gtm-6.3-007/sr_port/f_zparse.c Examining data/fis-gtm-6.3-007/sr_port/f_zpeek.c Examining data/fis-gtm-6.3-007/sr_port/f_zprevious.c Examining data/fis-gtm-6.3-007/sr_port/f_zqgblmod.c Examining data/fis-gtm-6.3-007/sr_port/f_zsearch.c Examining data/fis-gtm-6.3-007/sr_port/f_zsigproc.c Examining data/fis-gtm-6.3-007/sr_port/f_zsocket.c Examining data/fis-gtm-6.3-007/sr_port/f_ztrigger.c Examining data/fis-gtm-6.3-007/sr_port/f_ztrnlnm.c Examining data/fis-gtm-6.3-007/sr_port/f_zwidth.c Examining data/fis-gtm-6.3-007/sr_port/f_zwrite.c Examining data/fis-gtm-6.3-007/sr_port/fao_parm.h Examining data/fis-gtm-6.3-007/sr_port/fgn_glopref.c Examining data/fis-gtm-6.3-007/sr_port/fgncal.h Examining data/fis-gtm-6.3-007/sr_port/fgncal_lookup.c Examining data/fis-gtm-6.3-007/sr_port/fgncal_unwind.c Examining data/fis-gtm-6.3-007/sr_port/file_head_read.h Examining data/fis-gtm-6.3-007/sr_port/file_head_write.h Examining data/fis-gtm-6.3-007/sr_port/fileinfo.h Examining data/fis-gtm-6.3-007/sr_port/find_line_addr.c Examining data/fis-gtm-6.3-007/sr_port/find_line_start.c Examining data/fis-gtm-6.3-007/sr_port/find_mvstent.c Examining data/fis-gtm-6.3-007/sr_port/find_mvstent.h Examining data/fis-gtm-6.3-007/sr_port/find_rtn_hdr.c Examining data/fis-gtm-6.3-007/sr_port/five_2_ascii.c Examining data/fis-gtm-6.3-007/sr_port/five_2_ascii.h Examining data/fis-gtm-6.3-007/sr_port/five_bit.c Examining data/fis-gtm-6.3-007/sr_port/five_bit.h Examining data/fis-gtm-6.3-007/sr_port/fix_pages.h Examining data/fis-gtm-6.3-007/sr_port/fix_xfer_entry.h Examining data/fis-gtm-6.3-007/sr_port/flt_mod.c Examining data/fis-gtm-6.3-007/sr_port/flt_mod.h Examining data/fis-gtm-6.3-007/sr_port/flush_jmp.c Examining data/fis-gtm-6.3-007/sr_port/flush_jmp.h Examining data/fis-gtm-6.3-007/sr_port/flush_pio.c Examining data/fis-gtm-6.3-007/sr_port/fnname.h Examining data/fis-gtm-6.3-007/sr_port/fnorder.h Examining data/fis-gtm-6.3-007/sr_port/fnpc.h Examining data/fis-gtm-6.3-007/sr_port/fnpc_stats.c Examining data/fis-gtm-6.3-007/sr_port/fntext_ch.c Examining data/fis-gtm-6.3-007/sr_port/follow.h Examining data/fis-gtm-6.3-007/sr_port/format2disp.c Examining data/fis-gtm-6.3-007/sr_port/format2zwr.c Examining data/fis-gtm-6.3-007/sr_port/format_key_lv_val.c Examining data/fis-gtm-6.3-007/sr_port/format_key_mvals.c Examining data/fis-gtm-6.3-007/sr_port/format_lvname.c Examining data/fis-gtm-6.3-007/sr_port/format_targ_key.c Examining data/fis-gtm-6.3-007/sr_port/format_targ_key.h Examining data/fis-gtm-6.3-007/sr_port/fullbool.h Examining data/fis-gtm-6.3-007/sr_port/funsvn.h Examining data/fis-gtm-6.3-007/sr_port/gbldefs.c Examining data/fis-gtm-6.3-007/sr_port/gbldefs_usr_share.c Examining data/fis-gtm-6.3-007/sr_port/gds_blk_downgrade.c Examining data/fis-gtm-6.3-007/sr_port/gds_blk_downgrade.h Examining data/fis-gtm-6.3-007/sr_port/gds_blk_upgrade.c Examining data/fis-gtm-6.3-007/sr_port/gds_blk_upgrade.h Examining data/fis-gtm-6.3-007/sr_port/gds_map_moved.c Examining data/fis-gtm-6.3-007/sr_port/gds_map_moved.h Examining data/fis-gtm-6.3-007/sr_port/gds_rundown.h Examining data/fis-gtm-6.3-007/sr_port/gdsbgtr.h Examining data/fis-gtm-6.3-007/sr_port/gdsblk.h Examining data/fis-gtm-6.3-007/sr_port/gdsblkops.h Examining data/fis-gtm-6.3-007/sr_port/gdsbml.h Examining data/fis-gtm-6.3-007/sr_port/gdsbt.h Examining data/fis-gtm-6.3-007/sr_port/gdscc.h Examining data/fis-gtm-6.3-007/sr_port/gdsdbver.h Examining data/fis-gtm-6.3-007/sr_port/gdsdbver_sp.h Examining data/fis-gtm-6.3-007/sr_port/gdsfhead.h Examining data/fis-gtm-6.3-007/sr_port/gdsfilext.h Examining data/fis-gtm-6.3-007/sr_port/gdskill.h Examining data/fis-gtm-6.3-007/sr_port/gdsroot.h Examining data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c Examining data/fis-gtm-6.3-007/sr_port/get_command_line.h Examining data/fis-gtm-6.3-007/sr_port/get_dir_root.c Examining data/fis-gtm-6.3-007/sr_port/get_dlr_device.c Examining data/fis-gtm-6.3-007/sr_port/get_dlr_key.c Examining data/fis-gtm-6.3-007/sr_port/get_dlr_zkey.c Examining data/fis-gtm-6.3-007/sr_port/get_dollar_stack_info.c Examining data/fis-gtm-6.3-007/sr_port/get_frame_creation_info.c Examining data/fis-gtm-6.3-007/sr_port/get_frame_place_mcode.c Examining data/fis-gtm-6.3-007/sr_port/get_fs_block_size.c Examining data/fis-gtm-6.3-007/sr_port/get_fs_block_size.h Examining data/fis-gtm-6.3-007/sr_port/get_lmap.c Examining data/fis-gtm-6.3-007/sr_port/get_log_name.c Examining data/fis-gtm-6.3-007/sr_port/get_mladdr.c Examining data/fis-gtm-6.3-007/sr_port/get_mmseg.c Examining data/fis-gtm-6.3-007/sr_port/get_mumps_code.h Examining data/fis-gtm-6.3-007/sr_port/get_mvaddr.c Examining data/fis-gtm-6.3-007/sr_port/get_page_size.h Examining data/fis-gtm-6.3-007/sr_port/get_reference.c Examining data/fis-gtm-6.3-007/sr_port/get_reference.h Examining data/fis-gtm-6.3-007/sr_port/get_ret_targ.c Examining data/fis-gtm-6.3-007/sr_port/get_ret_targ.h Examining data/fis-gtm-6.3-007/sr_port/get_root.h Examining data/fis-gtm-6.3-007/sr_port/get_spec.c Examining data/fis-gtm-6.3-007/sr_port/get_spec.h Examining data/fis-gtm-6.3-007/sr_port/get_symb_line.c Examining data/fis-gtm-6.3-007/sr_port/getjobname.c Examining data/fis-gtm-6.3-007/sr_port/getjobname.h Examining data/fis-gtm-6.3-007/sr_port/getjobnum.h Examining data/fis-gtm-6.3-007/sr_port/getprime.c Examining data/fis-gtm-6.3-007/sr_port/getstorage.h Examining data/fis-gtm-6.3-007/sr_port/getzdir.c Examining data/fis-gtm-6.3-007/sr_port/getzdir.h Examining data/fis-gtm-6.3-007/sr_port/getzmode.h Examining data/fis-gtm-6.3-007/sr_port/getzposition.c Examining data/fis-gtm-6.3-007/sr_port/getzposition.h Examining data/fis-gtm-6.3-007/sr_port/getzprocess.h Examining data/fis-gtm-6.3-007/sr_port/global_map.c Examining data/fis-gtm-6.3-007/sr_port/global_map.h Examining data/fis-gtm-6.3-007/sr_port/glvn.c Examining data/fis-gtm-6.3-007/sr_port/glvn_pool.c Examining data/fis-gtm-6.3-007/sr_port/glvn_pool.h Examining data/fis-gtm-6.3-007/sr_port/goerrorframe.c Examining data/fis-gtm-6.3-007/sr_port/goframes.c Examining data/fis-gtm-6.3-007/sr_port/golevel.h Examining data/fis-gtm-6.3-007/sr_port/gtm_assert.c Examining data/fis-gtm-6.3-007/sr_port/gtm_assert2.c Examining data/fis-gtm-6.3-007/sr_port/gtm_bintim.h Examining data/fis-gtm-6.3-007/sr_port/gtm_byteswap_64.c Examining data/fis-gtm-6.3-007/sr_port/gtm_c_stack_trace.h Examining data/fis-gtm-6.3-007/sr_port/gtm_caseconv.h Examining data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h Examining data/fis-gtm-6.3-007/sr_port/gtm_connect.c Examining data/fis-gtm-6.3-007/sr_port/gtm_ctype.h Examining data/fis-gtm-6.3-007/sr_port/gtm_dirent.h Examining data/fis-gtm-6.3-007/sr_port/gtm_env_init.c Examining data/fis-gtm-6.3-007/sr_port/gtm_env_init.h Examining data/fis-gtm-6.3-007/sr_port/gtm_env_xlate_init.c Examining data/fis-gtm-6.3-007/sr_port/gtm_env_xlate_init.h Examining data/fis-gtm-6.3-007/sr_port/gtm_facility.h Examining data/fis-gtm-6.3-007/sr_port/gtm_fcntl.h Examining data/fis-gtm-6.3-007/sr_port/gtm_fetch.c Examining data/fis-gtm-6.3-007/sr_port/gtm_ffs.c Examining data/fis-gtm-6.3-007/sr_port/gtm_ffs.h Examining data/fis-gtm-6.3-007/sr_port/gtm_file_remove.h Examining data/fis-gtm-6.3-007/sr_port/gtm_file_stat.h Examining data/fis-gtm-6.3-007/sr_port/gtm_iconv.h Examining data/fis-gtm-6.3-007/sr_port/gtm_inet.h Examining data/fis-gtm-6.3-007/sr_port/gtm_ipv6.h Examining data/fis-gtm-6.3-007/sr_port/gtm_libaio.h Examining data/fis-gtm-6.3-007/sr_port/gtm_limits.h Examining data/fis-gtm-6.3-007/sr_port/gtm_malloc.c Examining data/fis-gtm-6.3-007/sr_port/gtm_malloc.h Examining data/fis-gtm-6.3-007/sr_port/gtm_malloc_dbg.c Examining data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h Examining data/fis-gtm-6.3-007/sr_port/gtm_maxstr.c Examining data/fis-gtm-6.3-007/sr_port/gtm_maxstr.h Examining data/fis-gtm-6.3-007/sr_port/gtm_memcmp.c Examining data/fis-gtm-6.3-007/sr_port/gtm_memcpy_validate_and_execute.c Examining data/fis-gtm-6.3-007/sr_port/gtm_memcpy_validate_and_execute.h Examining data/fis-gtm-6.3-007/sr_port/gtm_netdb.h Examining data/fis-gtm-6.3-007/sr_port/gtm_newintrinsic.c Examining data/fis-gtm-6.3-007/sr_port/gtm_newintrinsic.h Examining data/fis-gtm-6.3-007/sr_port/gtm_putmsg_list.h Examining data/fis-gtm-6.3-007/sr_port/gtm_pwd.h Examining data/fis-gtm-6.3-007/sr_port/gtm_relqueopi.c Examining data/fis-gtm-6.3-007/sr_port/gtm_rename.h Examining data/fis-gtm-6.3-007/sr_port/gtm_repl.h Examining data/fis-gtm-6.3-007/sr_port/gtm_reservedDB.h Examining data/fis-gtm-6.3-007/sr_port/gtm_savetraps.c Examining data/fis-gtm-6.3-007/sr_port/gtm_savetraps.h Examining data/fis-gtm-6.3-007/sr_port/gtm_select.h Examining data/fis-gtm-6.3-007/sr_port/gtm_sizeof.h Examining data/fis-gtm-6.3-007/sr_port/gtm_socket.h Examining data/fis-gtm-6.3-007/sr_port/gtm_stat.h Examining data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h Examining data/fis-gtm-6.3-007/sr_port/gtm_string.h Examining data/fis-gtm-6.3-007/sr_port/gtm_strings.h Examining data/fis-gtm-6.3-007/sr_port/gtm_tempnam.c Examining data/fis-gtm-6.3-007/sr_port/gtm_tempnam.h Examining data/fis-gtm-6.3-007/sr_port/gtm_text_alloc.h Examining data/fis-gtm-6.3-007/sr_port/gtm_threadgbl.h Examining data/fis-gtm-6.3-007/sr_port/gtm_threadgbl_defs.h Examining data/fis-gtm-6.3-007/sr_port/gtm_threadgbl_deftypes.c Examining data/fis-gtm-6.3-007/sr_port/gtm_threadgbl_init.c Examining data/fis-gtm-6.3-007/sr_port/gtm_threadgbl_init.h Examining data/fis-gtm-6.3-007/sr_port/gtm_time.h Examining data/fis-gtm-6.3-007/sr_port/gtm_un.h Examining data/fis-gtm-6.3-007/sr_port/gtm_unistd.h Examining data/fis-gtm-6.3-007/sr_port/gtm_utsname.h Examining data/fis-gtm-6.3-007/sr_port/gtm_wake.h Examining data/fis-gtm-6.3-007/sr_port/gtmctype.h Examining data/fis-gtm-6.3-007/sr_port/gtmdbglvl.h Examining data/fis-gtm-6.3-007/sr_port/gtmimagename.h Examining data/fis-gtm-6.3-007/sr_port/gtmimagetable.h Examining data/fis-gtm-6.3-007/sr_port/gtmmsg.h Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_ch.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_changelog.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_checkhealth.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_comm_init.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_end_helpers.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_exit.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_get_opt.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_helpers_init.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_reap_helpers.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_reinit_logseqno.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_showbacklog.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_start_helpers.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_statslog.c Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_upd_proc_init.c Examining data/fis-gtm-6.3-007/sr_port/gtmsource_ch.c Examining data/fis-gtm-6.3-007/sr_port/gtmsource_comm_init.c Examining data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c Examining data/fis-gtm-6.3-007/sr_port/gtmsource_exit.c Examining data/fis-gtm-6.3-007/sr_port/gtmsource_heartbeat.h Examining data/fis-gtm-6.3-007/sr_port/gtmsource_poll_actions.c Examining data/fis-gtm-6.3-007/sr_port/gtmsource_reinit_logseqno.c Examining data/fis-gtm-6.3-007/sr_port/gv_bind_name.c Examining data/fis-gtm-6.3-007/sr_port/gv_bind_subsname.c Examining data/fis-gtm-6.3-007/sr_port/gv_init_reg.c Examining data/fis-gtm-6.3-007/sr_port/gv_match.c Examining data/fis-gtm-6.3-007/sr_port/gv_match.h Examining data/fis-gtm-6.3-007/sr_port/gv_rundown.c Examining data/fis-gtm-6.3-007/sr_port/gv_rundown.h Examining data/fis-gtm-6.3-007/sr_port/gv_select.c Examining data/fis-gtm-6.3-007/sr_port/gv_select.h Examining data/fis-gtm-6.3-007/sr_port/gv_srch_gblname.c Examining data/fis-gtm-6.3-007/sr_port/gv_srch_map.c Examining data/fis-gtm-6.3-007/sr_port/gv_trigger_common.h Examining data/fis-gtm-6.3-007/sr_port/gv_xform_key.c Examining data/fis-gtm-6.3-007/sr_port/gv_xform_key.h Examining data/fis-gtm-6.3-007/sr_port/gvcmx.h Examining data/fis-gtm-6.3-007/sr_port/gvcmy_close.h Examining data/fis-gtm-6.3-007/sr_port/gvcmy_rundown.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_blk_build.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_blk_build.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_bmp_mark_free.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_bmp_mark_free.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_data.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_dataget.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_delete_blk.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_delete_blk.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_expand_any_key.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_expand_free_subtree.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_expand_free_subtree.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_expand_key.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_expand_key.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_gblmod.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_get.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_incr.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_init.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_jrt_null.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_jrt_null.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_kill.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_kill_blk.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_kill_blk.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_kill_sort.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_kill_sort.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_lbm_check.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_lbm_check.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_lftsib.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_map_build.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_map_build.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_order.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_protos.h Examining data/fis-gtm-6.3-007/sr_port/gvcst_put.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_query.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_queryget.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_root_search.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_rtsib.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_search.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_tp_init.c Examining data/fis-gtm-6.3-007/sr_port/gvcst_zprevious.c Examining data/fis-gtm-6.3-007/sr_port/gvincr_compute_post_incr.c Examining data/fis-gtm-6.3-007/sr_port/gvincr_recompute_upd_array.c Examining data/fis-gtm-6.3-007/sr_port/gvinit.c Examining data/fis-gtm-6.3-007/sr_port/gvn.c Examining data/fis-gtm-6.3-007/sr_port/gvn2gds.c Examining data/fis-gtm-6.3-007/sr_port/gvn2gds.h Examining data/fis-gtm-6.3-007/sr_port/gvname_env_restore.c Examining data/fis-gtm-6.3-007/sr_port/gvname_env_save.c Examining data/fis-gtm-6.3-007/sr_port/gvname_info.h Examining data/fis-gtm-6.3-007/sr_port/gvnh_spanreg.h Examining data/fis-gtm-6.3-007/sr_port/gvnh_spanreg_init.c Examining data/fis-gtm-6.3-007/sr_port/gvnh_spanreg_ismapped.c Examining data/fis-gtm-6.3-007/sr_port/gvnh_spanreg_subs_gvt_init.c Examining data/fis-gtm-6.3-007/sr_port/gvstats_rec.c Examining data/fis-gtm-6.3-007/sr_port/gvstats_rec.h Examining data/fis-gtm-6.3-007/sr_port/gvstrsub.h Examining data/fis-gtm-6.3-007/sr_port/gvsub2str.c Examining data/fis-gtm-6.3-007/sr_port/gvsub2str.h Examining data/fis-gtm-6.3-007/sr_port/gvt_hashtab.c Examining data/fis-gtm-6.3-007/sr_port/gvt_hashtab.h Examining data/fis-gtm-6.3-007/sr_port/gvusr.h Examining data/fis-gtm-6.3-007/sr_port/gvusr_queryget.h Examining data/fis-gtm-6.3-007/sr_port/gvzwr_arg.c Examining data/fis-gtm-6.3-007/sr_port/gvzwr_fini.c Examining data/fis-gtm-6.3-007/sr_port/gvzwr_init.c Examining data/fis-gtm-6.3-007/sr_port/gvzwr_out.c Examining data/fis-gtm-6.3-007/sr_port/gvzwr_var.c Examining data/fis-gtm-6.3-007/sr_port/gvzwrite_ch.c Examining data/fis-gtm-6.3-007/sr_port/gvzwrite_clnup.c Examining data/fis-gtm-6.3-007/sr_port/gvzwrite_clnup.h Examining data/fis-gtm-6.3-007/sr_port/hashtab.h Examining data/fis-gtm-6.3-007/sr_port/hashtab_addr.c Examining data/fis-gtm-6.3-007/sr_port/hashtab_addr.h Examining data/fis-gtm-6.3-007/sr_port/hashtab_implementation.h Examining data/fis-gtm-6.3-007/sr_port/hashtab_int4.c Examining data/fis-gtm-6.3-007/sr_port/hashtab_int4.h Examining data/fis-gtm-6.3-007/sr_port/hashtab_int8.c Examining data/fis-gtm-6.3-007/sr_port/hashtab_int8.h Examining data/fis-gtm-6.3-007/sr_port/hashtab_mname.c Examining data/fis-gtm-6.3-007/sr_port/hashtab_mname.h Examining data/fis-gtm-6.3-007/sr_port/hashtab_objcode.c Examining data/fis-gtm-6.3-007/sr_port/hashtab_objcode.h Examining data/fis-gtm-6.3-007/sr_port/hashtab_rehash_ch.c Examining data/fis-gtm-6.3-007/sr_port/hashtab_str.c Examining data/fis-gtm-6.3-007/sr_port/hashtab_str.h Examining data/fis-gtm-6.3-007/sr_port/have_crit.c Examining data/fis-gtm-6.3-007/sr_port/have_crit.h Examining data/fis-gtm-6.3-007/sr_port/i2asc.c Examining data/fis-gtm-6.3-007/sr_port/i2hex.c Examining data/fis-gtm-6.3-007/sr_port/i2hex_blkfill.c Examining data/fis-gtm-6.3-007/sr_port/i2hex_nofill.c Examining data/fis-gtm-6.3-007/sr_port/ind_cg_var.c Examining data/fis-gtm-6.3-007/sr_port/ind_code.c Examining data/fis-gtm-6.3-007/sr_port/indir.h Examining data/fis-gtm-6.3-007/sr_port/indir_enum.h Examining data/fis-gtm-6.3-007/sr_port/indir_lits.c Examining data/fis-gtm-6.3-007/sr_port/indirection.c Examining data/fis-gtm-6.3-007/sr_port/ins_errtriple.c Examining data/fis-gtm-6.3-007/sr_port/ins_triple.c Examining data/fis-gtm-6.3-007/sr_port/insert_region.c Examining data/fis-gtm-6.3-007/sr_port/inst_flush.h Examining data/fis-gtm-6.3-007/sr_port/int_label.c Examining data/fis-gtm-6.3-007/sr_port/int_namelook.c Examining data/fis-gtm-6.3-007/sr_port/int_namelook.h Examining data/fis-gtm-6.3-007/sr_port/io.h Examining data/fis-gtm-6.3-007/sr_port/io_dev_dispatch.h Examining data/fis-gtm-6.3-007/sr_port/io_init.c Examining data/fis-gtm-6.3-007/sr_port/io_init_ch.c Examining data/fis-gtm-6.3-007/sr_port/io_params.h Examining data/fis-gtm-6.3-007/sr_port/io_rundown.c Examining data/fis-gtm-6.3-007/sr_port/ionl_close.c Examining data/fis-gtm-6.3-007/sr_port/ionl_dummy.c Examining data/fis-gtm-6.3-007/sr_port/ionl_flush.c Examining data/fis-gtm-6.3-007/sr_port/ionl_open.c Examining data/fis-gtm-6.3-007/sr_port/ionl_rdone.c Examining data/fis-gtm-6.3-007/sr_port/ionl_read.c Examining data/fis-gtm-6.3-007/sr_port/ionl_readfl.c Examining data/fis-gtm-6.3-007/sr_port/ionl_use.c Examining data/fis-gtm-6.3-007/sr_port/ionl_write.c Examining data/fis-gtm-6.3-007/sr_port/ionl_wteol.c Examining data/fis-gtm-6.3-007/sr_port/ionl_wtff.c Examining data/fis-gtm-6.3-007/sr_port/ionl_wtone.c Examining data/fis-gtm-6.3-007/sr_port/iop.h Examining data/fis-gtm-6.3-007/sr_port/iop_parms_size.c Examining data/fis-gtm-6.3-007/sr_port/iorm_wtff.c Examining data/fis-gtm-6.3-007/sr_port/iorm_wtone.c Examining data/fis-gtm-6.3-007/sr_port/iormdefsp.h Examining data/fis-gtm-6.3-007/sr_port/iosocket_bind.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_close.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_connect.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_create.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_destroy.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_flush.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_handle.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_listen.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_open.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_poolinit.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_rdone.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_read.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_snr.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_switch.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_use.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_wait.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_write.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_wteol.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_wtff.c Examining data/fis-gtm-6.3-007/sr_port/iosocket_wtone.c Examining data/fis-gtm-6.3-007/sr_port/iosocketdef.h Examining data/fis-gtm-6.3-007/sr_port/iotimer.h Examining data/fis-gtm-6.3-007/sr_port/iott_dummy.c Examining data/fis-gtm-6.3-007/sr_port/iott_escape.c Examining data/fis-gtm-6.3-007/sr_port/iott_wrterr.c Examining data/fis-gtm-6.3-007/sr_port/iott_wrterr.h Examining data/fis-gtm-6.3-007/sr_port/iott_wteol.c Examining data/fis-gtm-6.3-007/sr_port/iott_wtff.c Examining data/fis-gtm-6.3-007/sr_port/iott_wtone.c Examining data/fis-gtm-6.3-007/sr_port/ious_close.c Examining data/fis-gtm-6.3-007/sr_port/ious_dummy.c Examining data/fis-gtm-6.3-007/sr_port/ious_flush.c Examining data/fis-gtm-6.3-007/sr_port/ious_use.c Examining data/fis-gtm-6.3-007/sr_port/ious_wteol.c Examining data/fis-gtm-6.3-007/sr_port/ious_wtff.c Examining data/fis-gtm-6.3-007/sr_port/iousdef.h Examining data/fis-gtm-6.3-007/sr_port/is_canonic_name.c Examining data/fis-gtm-6.3-007/sr_port/is_canonic_name.h Examining data/fis-gtm-6.3-007/sr_port/is_equ.c Examining data/fis-gtm-6.3-007/sr_port/is_file_identical.h Examining data/fis-gtm-6.3-007/sr_port/is_ident.c Examining data/fis-gtm-6.3-007/sr_port/is_proc_alive.h Examining data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c Examining data/fis-gtm-6.3-007/sr_port/jmp_opto.c Examining data/fis-gtm-6.3-007/sr_port/jmp_opto.h Examining data/fis-gtm-6.3-007/sr_port/jnl.h Examining data/fis-gtm-6.3-007/sr_port/jnl2ext.c Examining data/fis-gtm-6.3-007/sr_port/jnl_ensure_open.c Examining data/fis-gtm-6.3-007/sr_port/jnl_file_close.c Examining data/fis-gtm-6.3-007/sr_port/jnl_file_lost.c Examining data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c Examining data/fis-gtm-6.3-007/sr_port/jnl_file_open_switch.c Examining data/fis-gtm-6.3-007/sr_port/jnl_flush.c Examining data/fis-gtm-6.3-007/sr_port/jnl_format.c Examining data/fis-gtm-6.3-007/sr_port/jnl_get_checksum.c Examining data/fis-gtm-6.3-007/sr_port/jnl_get_checksum.h Examining data/fis-gtm-6.3-007/sr_port/jnl_phase2_cleanup.c Examining data/fis-gtm-6.3-007/sr_port/jnl_phase2_salvage.c Examining data/fis-gtm-6.3-007/sr_port/jnl_pool_write.c Examining data/fis-gtm-6.3-007/sr_port/jnl_rec_table.h Examining data/fis-gtm-6.3-007/sr_port/jnl_send_oper.c Examining data/fis-gtm-6.3-007/sr_port/jnl_set_cur_prior.c Examining data/fis-gtm-6.3-007/sr_port/jnl_typedef.h Examining data/fis-gtm-6.3-007/sr_port/jnl_wait.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write.h Examining data/fis-gtm-6.3-007/sr_port/jnl_write_aimg_rec.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_aimg_rec.h Examining data/fis-gtm-6.3-007/sr_port/jnl_write_align_rec.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_attempt.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_eof_rec.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_epoch_rec.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_extend_if_needed.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_inctn_rec.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_logical.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_multi_align_rec.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_pblk.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_pblk.h Examining data/fis-gtm-6.3-007/sr_port/jnl_write_pfin.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_phase2.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_pini.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_reserve.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_trunc_rec.c Examining data/fis-gtm-6.3-007/sr_port/jnl_write_ztp_logical.c Examining data/fis-gtm-6.3-007/sr_port/jnlpool_hasnt_overflowed.c Examining data/fis-gtm-6.3-007/sr_port/job.h Examining data/fis-gtm-6.3-007/sr_port/job_addr.c Examining data/fis-gtm-6.3-007/sr_port/job_addr.h Examining data/fis-gtm-6.3-007/sr_port/jobexam_process.c Examining data/fis-gtm-6.3-007/sr_port/jobexam_process.h Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_event.c Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_event.h Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_init.c Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_init.h Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_process.c Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_process.h Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_process_cleanup.c Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_process_cleanup.h Examining data/fis-gtm-6.3-007/sr_port/jobparameters.c Examining data/fis-gtm-6.3-007/sr_port/jobparams.h Examining data/fis-gtm-6.3-007/sr_port/jobparamstrs.h Examining data/fis-gtm-6.3-007/sr_port/la_encrypt.c Examining data/fis-gtm-6.3-007/sr_port/la_encrypt.h Examining data/fis-gtm-6.3-007/sr_port/lb_init.c Examining data/fis-gtm-6.3-007/sr_port/lb_init.h Examining data/fis-gtm-6.3-007/sr_port/lckclr.c Examining data/fis-gtm-6.3-007/sr_port/lckclr.h Examining data/fis-gtm-6.3-007/sr_port/lcl_arg1_is_desc_of_arg2.c Examining data/fis-gtm-6.3-007/sr_port/line.c Examining data/fis-gtm-6.3-007/sr_port/linetail.c Examining data/fis-gtm-6.3-007/sr_port/linktrc.h Examining data/fis-gtm-6.3-007/sr_port/list_file.h Examining data/fis-gtm-6.3-007/sr_port/lke.h Examining data/fis-gtm-6.3-007/sr_port/lke_clean.c Examining data/fis-gtm-6.3-007/sr_port/lke_clear.c Examining data/fis-gtm-6.3-007/sr_port/lke_clearlock.c Examining data/fis-gtm-6.3-007/sr_port/lke_clearlock.h Examining data/fis-gtm-6.3-007/sr_port/lke_cleartree.c Examining data/fis-gtm-6.3-007/sr_port/lke_cleartree.h Examining data/fis-gtm-6.3-007/sr_port/lke_exit.c Examining data/fis-gtm-6.3-007/sr_port/lke_getcli.c Examining data/fis-gtm-6.3-007/sr_port/lke_getcli.h Examining data/fis-gtm-6.3-007/sr_port/lke_getki.c Examining data/fis-gtm-6.3-007/sr_port/lke_growhash.c Examining data/fis-gtm-6.3-007/sr_port/lke_show.c Examining data/fis-gtm-6.3-007/sr_port/lke_showlock.c Examining data/fis-gtm-6.3-007/sr_port/lke_showtree.c Examining data/fis-gtm-6.3-007/sr_port/lkglvn.c Examining data/fis-gtm-6.3-007/sr_port/localvarmonitor.h Examining data/fis-gtm-6.3-007/sr_port/lock_str_to_buff.c Examining data/fis-gtm-6.3-007/sr_port/lock_str_to_buff.h Examining data/fis-gtm-6.3-007/sr_port/lockconst.h Examining data/fis-gtm-6.3-007/sr_port/locklits.h Examining data/fis-gtm-6.3-007/sr_port/logical_truth_value.c Examining data/fis-gtm-6.3-007/sr_port/logical_truth_value.h Examining data/fis-gtm-6.3-007/sr_port/longset.h Examining data/fis-gtm-6.3-007/sr_port/lookup_variable_htent.c Examining data/fis-gtm-6.3-007/sr_port/lookup_variable_htent.h Examining data/fis-gtm-6.3-007/sr_port/lower_to_upper.c Examining data/fis-gtm-6.3-007/sr_port/lref.c Examining data/fis-gtm-6.3-007/sr_port/lv_getslot.c Examining data/fis-gtm-6.3-007/sr_port/lv_kill.c Examining data/fis-gtm-6.3-007/sr_port/lv_killarray.c Examining data/fis-gtm-6.3-007/sr_port/lv_newblock.c Examining data/fis-gtm-6.3-007/sr_port/lv_newname.c Examining data/fis-gtm-6.3-007/sr_port/lv_tree.c Examining data/fis-gtm-6.3-007/sr_port/lv_tree.h Examining data/fis-gtm-6.3-007/sr_port/lv_val.h Examining data/fis-gtm-6.3-007/sr_port/lv_var_clone.c Examining data/fis-gtm-6.3-007/sr_port/lvmon_compare_value_slots.c Examining data/fis-gtm-6.3-007/sr_port/lvmon_pull_values.c Examining data/fis-gtm-6.3-007/sr_port/lvn.c Examining data/fis-gtm-6.3-007/sr_port/lvzwr_arg.c Examining data/fis-gtm-6.3-007/sr_port/lvzwr_fini.c Examining data/fis-gtm-6.3-007/sr_port/lvzwr_init.c Examining data/fis-gtm-6.3-007/sr_port/lvzwr_key.c Examining data/fis-gtm-6.3-007/sr_port/lvzwr_out.c Examining data/fis-gtm-6.3-007/sr_port/lvzwr_var.c Examining data/fis-gtm-6.3-007/sr_port/m_break.c Examining data/fis-gtm-6.3-007/sr_port/m_close.c Examining data/fis-gtm-6.3-007/sr_port/m_do.c Examining data/fis-gtm-6.3-007/sr_port/m_else.c Examining data/fis-gtm-6.3-007/sr_port/m_for.c Examining data/fis-gtm-6.3-007/sr_port/m_goto.c Examining data/fis-gtm-6.3-007/sr_port/m_goto_postcond.c Examining data/fis-gtm-6.3-007/sr_port/m_halt.c Examining data/fis-gtm-6.3-007/sr_port/m_hang.c Examining data/fis-gtm-6.3-007/sr_port/m_hcmd.c Examining data/fis-gtm-6.3-007/sr_port/m_if.c Examining data/fis-gtm-6.3-007/sr_port/m_job.c Examining data/fis-gtm-6.3-007/sr_port/m_kill.c Examining data/fis-gtm-6.3-007/sr_port/m_lock.c Examining data/fis-gtm-6.3-007/sr_port/m_merge.c Examining data/fis-gtm-6.3-007/sr_port/m_new.c Examining data/fis-gtm-6.3-007/sr_port/m_open.c Examining data/fis-gtm-6.3-007/sr_port/m_quit.c Examining data/fis-gtm-6.3-007/sr_port/m_read.c Examining data/fis-gtm-6.3-007/sr_port/m_set.c Examining data/fis-gtm-6.3-007/sr_port/m_tcommit.c Examining data/fis-gtm-6.3-007/sr_port/m_trestart.c Examining data/fis-gtm-6.3-007/sr_port/m_trollback.c Examining data/fis-gtm-6.3-007/sr_port/m_tstart.c Examining data/fis-gtm-6.3-007/sr_port/m_use.c Examining data/fis-gtm-6.3-007/sr_port/m_view.c Examining data/fis-gtm-6.3-007/sr_port/m_write.c Examining data/fis-gtm-6.3-007/sr_port/m_xecute.c Examining data/fis-gtm-6.3-007/sr_port/m_zallocate.c Examining data/fis-gtm-6.3-007/sr_port/m_zattach.c Examining data/fis-gtm-6.3-007/sr_port/m_zbreak.c Examining data/fis-gtm-6.3-007/sr_port/m_zcompile.c Examining data/fis-gtm-6.3-007/sr_port/m_zcontinue.c Examining data/fis-gtm-6.3-007/sr_port/m_zdeallocate.c Examining data/fis-gtm-6.3-007/sr_port/m_zedit.c Examining data/fis-gtm-6.3-007/sr_port/m_zgoto.c Examining data/fis-gtm-6.3-007/sr_port/m_zhalt.c Examining data/fis-gtm-6.3-007/sr_port/m_zhelp.c Examining data/fis-gtm-6.3-007/sr_port/m_zinvcmd.c Examining data/fis-gtm-6.3-007/sr_port/m_zlink.c Examining data/fis-gtm-6.3-007/sr_port/m_zmessage.c Examining data/fis-gtm-6.3-007/sr_port/m_zprint.c Examining data/fis-gtm-6.3-007/sr_port/m_zshow.c Examining data/fis-gtm-6.3-007/sr_port/m_zstep.c Examining data/fis-gtm-6.3-007/sr_port/m_zsystem.c Examining data/fis-gtm-6.3-007/sr_port/m_ztcommit.c Examining data/fis-gtm-6.3-007/sr_port/m_ztstart.c Examining data/fis-gtm-6.3-007/sr_port/m_zwatch.c Examining data/fis-gtm-6.3-007/sr_port/m_zwithdraw.c Examining data/fis-gtm-6.3-007/sr_port/m_zwrite.c Examining data/fis-gtm-6.3-007/sr_port/main_pragma.h Examining data/fis-gtm-6.3-007/sr_port/make_commarg.c Examining data/fis-gtm-6.3-007/sr_port/make_gvsubsc.c Examining data/fis-gtm-6.3-007/sr_port/maketriple.c Examining data/fis-gtm-6.3-007/sr_port/matchc.c Examining data/fis-gtm-6.3-007/sr_port/matchc.h Examining data/fis-gtm-6.3-007/sr_port/mcalloc.c Examining data/fis-gtm-6.3-007/sr_port/mcfree.c Examining data/fis-gtm-6.3-007/sr_port/md5hash.c Examining data/fis-gtm-6.3-007/sr_port/md5hash.h Examining data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c Examining data/fis-gtm-6.3-007/sr_port/mdef.h Examining data/fis-gtm-6.3-007/sr_port/mdq.h Examining data/fis-gtm-6.3-007/sr_port/mem_access.h Examining data/fis-gtm-6.3-007/sr_port/memcoherency.h Examining data/fis-gtm-6.3-007/sr_port/memvcmp.c Examining data/fis-gtm-6.3-007/sr_port/merge_def.h Examining data/fis-gtm-6.3-007/sr_port/merge_desc_check.c Examining data/fis-gtm-6.3-007/sr_port/min_max.h Examining data/fis-gtm-6.3-007/sr_port/mlabel2xtern.c Examining data/fis-gtm-6.3-007/sr_port/mlabel2xtern.h Examining data/fis-gtm-6.3-007/sr_port/mlk_bckout.c Examining data/fis-gtm-6.3-007/sr_port/mlk_bckout.h Examining data/fis-gtm-6.3-007/sr_port/mlk_check_own.c Examining data/fis-gtm-6.3-007/sr_port/mlk_check_own.h Examining data/fis-gtm-6.3-007/sr_port/mlk_garbage_collect.c Examining data/fis-gtm-6.3-007/sr_port/mlk_garbage_collect.h Examining data/fis-gtm-6.3-007/sr_port/mlk_gbldef.c Examining data/fis-gtm-6.3-007/sr_port/mlk_lock.c Examining data/fis-gtm-6.3-007/sr_port/mlk_lock.h Examining data/fis-gtm-6.3-007/sr_port/mlk_nocrit_unlock.c Examining data/fis-gtm-6.3-007/sr_port/mlk_ops.h Examining data/fis-gtm-6.3-007/sr_port/mlk_prcblk_add.c Examining data/fis-gtm-6.3-007/sr_port/mlk_prcblk_add.h Examining data/fis-gtm-6.3-007/sr_port/mlk_prcblk_delete.c Examining data/fis-gtm-6.3-007/sr_port/mlk_prcblk_delete.h Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_create.c Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_create.h Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_delete.c Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_delete.h Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_equ.c Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_equ.h Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_insert.c Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_insert.h Examining data/fis-gtm-6.3-007/sr_port/mlk_region_lookup.c Examining data/fis-gtm-6.3-007/sr_port/mlk_region_lookup.h Examining data/fis-gtm-6.3-007/sr_port/mlk_shr_init.c Examining data/fis-gtm-6.3-007/sr_port/mlk_shr_init.h Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_create.c Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_create.h Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_delete_if_empty.c Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_delete_if_empty.h Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_find.c Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_find.h Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_sort.c Examining data/fis-gtm-6.3-007/sr_port/mlk_shrclean.c Examining data/fis-gtm-6.3-007/sr_port/mlk_shrclean.h Examining data/fis-gtm-6.3-007/sr_port/mlk_shrhash_find_bucket.c Examining data/fis-gtm-6.3-007/sr_port/mlk_shrhash_find_bucket.h Examining data/fis-gtm-6.3-007/sr_port/mlk_shrhash_resize.c Examining data/fis-gtm-6.3-007/sr_port/mlk_shrhash_resize.h Examining data/fis-gtm-6.3-007/sr_port/mlk_shrsub_garbage_collect.c Examining data/fis-gtm-6.3-007/sr_port/mlk_shrsub_garbage_collect.h Examining data/fis-gtm-6.3-007/sr_port/mlk_tree_wake_children.c Examining data/fis-gtm-6.3-007/sr_port/mlk_tree_wake_children.h Examining data/fis-gtm-6.3-007/sr_port/mlk_unlock.c Examining data/fis-gtm-6.3-007/sr_port/mlk_unlock.h Examining data/fis-gtm-6.3-007/sr_port/mlk_unpend.c Examining data/fis-gtm-6.3-007/sr_port/mlk_unpend.h Examining data/fis-gtm-6.3-007/sr_port/mlk_wake_pending.c Examining data/fis-gtm-6.3-007/sr_port/mlk_wake_pending.h Examining data/fis-gtm-6.3-007/sr_port/mlkdef.h Examining data/fis-gtm-6.3-007/sr_port/mm_read.c Examining data/fis-gtm-6.3-007/sr_port/mm_read.h Examining data/fis-gtm-6.3-007/sr_port/mm_update.h Examining data/fis-gtm-6.3-007/sr_port/mmemory.h Examining data/fis-gtm-6.3-007/sr_port/mmseg.h Examining data/fis-gtm-6.3-007/sr_port/movtc.c Examining data/fis-gtm-6.3-007/sr_port/movtc.h Examining data/fis-gtm-6.3-007/sr_port/mprof.h Examining data/fis-gtm-6.3-007/sr_port/mprof_funcs.c Examining data/fis-gtm-6.3-007/sr_port/mprof_stack.c Examining data/fis-gtm-6.3-007/sr_port/mprof_tree.c Examining data/fis-gtm-6.3-007/sr_port/mrout2xtern.h Examining data/fis-gtm-6.3-007/sr_port/mstack_size_init.c Examining data/fis-gtm-6.3-007/sr_port/mstack_size_init.h Examining data/fis-gtm-6.3-007/sr_port/mtables.c Examining data/fis-gtm-6.3-007/sr_port/mtables.h Examining data/fis-gtm-6.3-007/sr_port/mu_clsce.c Examining data/fis-gtm-6.3-007/sr_port/mu_cre_file.h Examining data/fis-gtm-6.3-007/sr_port/mu_dwngrd_header.c Examining data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c Examining data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c Examining data/fis-gtm-6.3-007/sr_port/mu_extr_ident.c Examining data/fis-gtm-6.3-007/sr_port/mu_freeze_ch.c Examining data/fis-gtm-6.3-007/sr_port/mu_getlst.h Examining data/fis-gtm-6.3-007/sr_port/mu_gv_cur_reg_init.c Examining data/fis-gtm-6.3-007/sr_port/mu_gv_cur_reg_init.h Examining data/fis-gtm-6.3-007/sr_port/mu_gv_stack_init.c Examining data/fis-gtm-6.3-007/sr_port/mu_gv_stack_init.h Examining data/fis-gtm-6.3-007/sr_port/mu_gvis.h Examining data/fis-gtm-6.3-007/sr_port/mu_int_blk.c Examining data/fis-gtm-6.3-007/sr_port/mu_int_err.c Examining data/fis-gtm-6.3-007/sr_port/mu_int_fhead.c Examining data/fis-gtm-6.3-007/sr_port/mu_int_getkey.c Examining data/fis-gtm-6.3-007/sr_port/mu_int_init.c Examining data/fis-gtm-6.3-007/sr_port/mu_int_maps.c Examining data/fis-gtm-6.3-007/sr_port/mu_int_maps.h Examining data/fis-gtm-6.3-007/sr_port/mu_int_read.c Examining data/fis-gtm-6.3-007/sr_port/mu_int_reg.c Examining data/fis-gtm-6.3-007/sr_port/mu_int_reg_ch.c Examining data/fis-gtm-6.3-007/sr_port/mu_int_wait_rdonly.c Examining data/fis-gtm-6.3-007/sr_port/mu_int_wait_rdonly.h Examining data/fis-gtm-6.3-007/sr_port/mu_int_write.c Examining data/fis-gtm-6.3-007/sr_port/mu_interactive.c Examining data/fis-gtm-6.3-007/sr_port/mu_interactive.h Examining data/fis-gtm-6.3-007/sr_port/mu_outofband_setup.h Examining data/fis-gtm-6.3-007/sr_port/mu_put_gvdata.c Examining data/fis-gtm-6.3-007/sr_port/mu_put_gvn_fragment.c Examining data/fis-gtm-6.3-007/sr_port/mu_reduce_level.c Examining data/fis-gtm-6.3-007/sr_port/mu_reorg.c Examining data/fis-gtm-6.3-007/sr_port/mu_reorg.h Examining data/fis-gtm-6.3-007/sr_port/mu_reorg_upgrd_dwngrd.c Examining data/fis-gtm-6.3-007/sr_port/mu_reorg_upgrd_dwngrd.h Examining data/fis-gtm-6.3-007/sr_port/mu_signal_process.h Examining data/fis-gtm-6.3-007/sr_port/mu_split.c Examining data/fis-gtm-6.3-007/sr_port/mu_swap_blk.c Examining data/fis-gtm-6.3-007/sr_port/mu_upgrd_dngrd_confirmed.c Examining data/fis-gtm-6.3-007/sr_port/mu_upgrd_dngrd_confirmed.h Examining data/fis-gtm-6.3-007/sr_port/mu_upgrd_dngrd_hdr.h Examining data/fis-gtm-6.3-007/sr_port/mu_upgrd_header.c Examining data/fis-gtm-6.3-007/sr_port/mubclnup.c Examining data/fis-gtm-6.3-007/sr_port/mucblkini.h Examining data/fis-gtm-6.3-007/sr_port/mucregini.c Examining data/fis-gtm-6.3-007/sr_port/mucregini.h Examining data/fis-gtm-6.3-007/sr_port/muext_rec_table.h Examining data/fis-gtm-6.3-007/sr_port/muextr.h Examining data/fis-gtm-6.3-007/sr_port/mupfndfil.c Examining data/fis-gtm-6.3-007/sr_port/mupint.h Examining data/fis-gtm-6.3-007/sr_port/mupip_backup.c Examining data/fis-gtm-6.3-007/sr_port/mupip_backup.h Examining data/fis-gtm-6.3-007/sr_port/mupip_create.c Examining data/fis-gtm-6.3-007/sr_port/mupip_create.h Examining data/fis-gtm-6.3-007/sr_port/mupip_cvtgbl.h Examining data/fis-gtm-6.3-007/sr_port/mupip_cvtpgm.h Examining data/fis-gtm-6.3-007/sr_port/mupip_downgrade.c Examining data/fis-gtm-6.3-007/sr_port/mupip_downgrade.h Examining data/fis-gtm-6.3-007/sr_port/mupip_exit.h Examining data/fis-gtm-6.3-007/sr_port/mupip_extend.c Examining data/fis-gtm-6.3-007/sr_port/mupip_extend.h Examining data/fis-gtm-6.3-007/sr_port/mupip_freeze.c Examining data/fis-gtm-6.3-007/sr_port/mupip_freeze.h Examining data/fis-gtm-6.3-007/sr_port/mupip_help.h Examining data/fis-gtm-6.3-007/sr_port/mupip_integ.c Examining data/fis-gtm-6.3-007/sr_port/mupip_integ.h Examining data/fis-gtm-6.3-007/sr_port/mupip_intrpt.c Examining data/fis-gtm-6.3-007/sr_port/mupip_intrpt.h Examining data/fis-gtm-6.3-007/sr_port/mupip_io_dev_dispatch.h Examining data/fis-gtm-6.3-007/sr_port/mupip_load_ch.c Examining data/fis-gtm-6.3-007/sr_port/mupip_put_gvdata.h Examining data/fis-gtm-6.3-007/sr_port/mupip_put_gvn_fragment.h Examining data/fis-gtm-6.3-007/sr_port/mupip_quit.h Examining data/fis-gtm-6.3-007/sr_port/mupip_recover.c Examining data/fis-gtm-6.3-007/sr_port/mupip_recover.h Examining data/fis-gtm-6.3-007/sr_port/mupip_reorg.c Examining data/fis-gtm-6.3-007/sr_port/mupip_reorg.h Examining data/fis-gtm-6.3-007/sr_port/mupip_restore.h Examining data/fis-gtm-6.3-007/sr_port/mupip_rundown.h Examining data/fis-gtm-6.3-007/sr_port/mupip_set.c Examining data/fis-gtm-6.3-007/sr_port/mupip_set.h Examining data/fis-gtm-6.3-007/sr_port/mupip_set_jnl_ch.c Examining data/fis-gtm-6.3-007/sr_port/mupip_set_jnl_cleanup.c Examining data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c Examining data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c Examining data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c Examining data/fis-gtm-6.3-007/sr_port/mupip_set_journal_newstate.c Examining data/fis-gtm-6.3-007/sr_port/mupip_set_journal_parse.c Examining data/fis-gtm-6.3-007/sr_port/mupip_stop.c Examining data/fis-gtm-6.3-007/sr_port/mupip_stop.h Examining data/fis-gtm-6.3-007/sr_port/mupip_upgrade.c Examining data/fis-gtm-6.3-007/sr_port/mupip_upgrade.h Examining data/fis-gtm-6.3-007/sr_port/mupipbckup.h Examining data/fis-gtm-6.3-007/sr_port/muprec.h Examining data/fis-gtm-6.3-007/sr_port/mur_apply_pblk.c Examining data/fis-gtm-6.3-007/sr_port/mur_back_process.c Examining data/fis-gtm-6.3-007/sr_port/mur_block_count_correct.c Examining data/fis-gtm-6.3-007/sr_port/mur_blocks_free.c Examining data/fis-gtm-6.3-007/sr_port/mur_close_file_extfmt.c Examining data/fis-gtm-6.3-007/sr_port/mur_close_files.c Examining data/fis-gtm-6.3-007/sr_port/mur_db_files_from_jnllist.c Examining data/fis-gtm-6.3-007/sr_port/mur_db_files_from_jnllist.h Examining data/fis-gtm-6.3-007/sr_port/mur_do_wildcard.c Examining data/fis-gtm-6.3-007/sr_port/mur_forward.c Examining data/fis-gtm-6.3-007/sr_port/mur_forward_play_cur_jrec.c Examining data/fis-gtm-6.3-007/sr_port/mur_forward_play_multireg_tp.c Examining data/fis-gtm-6.3-007/sr_port/mur_gbldefs.c Examining data/fis-gtm-6.3-007/sr_port/mur_get_options.c Examining data/fis-gtm-6.3-007/sr_port/mur_get_pini.c Examining data/fis-gtm-6.3-007/sr_port/mur_init.c Examining data/fis-gtm-6.3-007/sr_port/mur_insert_prev.c Examining data/fis-gtm-6.3-007/sr_port/mur_jctl_from_next_gen.c Examining data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c Examining data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.h Examining data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c Examining data/fis-gtm-6.3-007/sr_port/mur_multi_rehash.c Examining data/fis-gtm-6.3-007/sr_port/mur_open_files.c Examining data/fis-gtm-6.3-007/sr_port/mur_output_record.c Examining data/fis-gtm-6.3-007/sr_port/mur_output_show.c Examining data/fis-gtm-6.3-007/sr_port/mur_pini_addr_reset.c Examining data/fis-gtm-6.3-007/sr_port/mur_pini_state.c Examining data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c Examining data/fis-gtm-6.3-007/sr_port/mur_process_seqno_table.c Examining data/fis-gtm-6.3-007/sr_port/mur_process_timequal.c Examining data/fis-gtm-6.3-007/sr_port/mur_process_token_table.c Examining data/fis-gtm-6.3-007/sr_port/mur_put_aimg_rec.c Examining data/fis-gtm-6.3-007/sr_port/mur_read_file.c Examining data/fis-gtm-6.3-007/sr_port/mur_read_file.h Examining data/fis-gtm-6.3-007/sr_port/mur_rem_jctls.c Examining data/fis-gtm-6.3-007/sr_port/mur_report_error.c Examining data/fis-gtm-6.3-007/sr_port/mur_select_rec.c Examining data/fis-gtm-6.3-007/sr_port/mur_sort_files.c Examining data/fis-gtm-6.3-007/sr_port/mur_token_lookup.c Examining data/fis-gtm-6.3-007/sr_port/mur_tp_resolve_time.c Examining data/fis-gtm-6.3-007/sr_port/mur_validate_checksum.c Examining data/fis-gtm-6.3-007/sr_port/mur_validate_checksum.h Examining data/fis-gtm-6.3-007/sr_port/mur_write_header_extfmt.c Examining data/fis-gtm-6.3-007/sr_port/mur_ztp_lookback.c Examining data/fis-gtm-6.3-007/sr_port/murest.h Examining data/fis-gtm-6.3-007/sr_port/mutex.h Examining data/fis-gtm-6.3-007/sr_port/mutex_deadlock_check.c Examining data/fis-gtm-6.3-007/sr_port/mutex_deadlock_check.h Examining data/fis-gtm-6.3-007/sr_port/mv_stent.h Examining data/fis-gtm-6.3-007/sr_port/mval2fao.c Examining data/fis-gtm-6.3-007/sr_port/mval2fao.h Examining data/fis-gtm-6.3-007/sr_port/mval2subsc.c Examining data/fis-gtm-6.3-007/sr_port/mval_lex.c Examining data/fis-gtm-6.3-007/sr_port/mval_nongraphic.c Examining data/fis-gtm-6.3-007/sr_port/mval_write.c Examining data/fis-gtm-6.3-007/sr_port/mvalconv.c Examining data/fis-gtm-6.3-007/sr_port/mvalconv.h Examining data/fis-gtm-6.3-007/sr_port/n2s.c Examining data/fis-gtm-6.3-007/sr_port/name_glvn.c Examining data/fis-gtm-6.3-007/sr_port/namelook.c Examining data/fis-gtm-6.3-007/sr_port/namelook.h Examining data/fis-gtm-6.3-007/sr_port/nametabtyp.h Examining data/fis-gtm-6.3-007/sr_port/new_stack_frame.c Examining data/fis-gtm-6.3-007/sr_port/newtriple.c Examining data/fis-gtm-6.3-007/sr_port/nil_iocontrol.c Examining data/fis-gtm-6.3-007/sr_port/nref.c Examining data/fis-gtm-6.3-007/sr_port/numcmp.c Examining data/fis-gtm-6.3-007/sr_port/numcmp.h Examining data/fis-gtm-6.3-007/sr_port/obj_file.h Examining data/fis-gtm-6.3-007/sr_port/obj_gen.h Examining data/fis-gtm-6.3-007/sr_port/objlabel.h Examining data/fis-gtm-6.3-007/sr_port/oc_tab.c Examining data/fis-gtm-6.3-007/sr_port/oc_tab_graphic.c Examining data/fis-gtm-6.3-007/sr_port/one_job_param.c Examining data/fis-gtm-6.3-007/sr_port/op.h Examining data/fis-gtm-6.3-007/sr_port/op_add.c Examining data/fis-gtm-6.3-007/sr_port/op_bindparm.c Examining data/fis-gtm-6.3-007/sr_port/op_break.c Examining data/fis-gtm-6.3-007/sr_port/op_cat.c Examining data/fis-gtm-6.3-007/sr_port/op_close.c Examining data/fis-gtm-6.3-007/sr_port/op_clralsvars.c Examining data/fis-gtm-6.3-007/sr_port/op_commarg.c Examining data/fis-gtm-6.3-007/sr_port/op_cvtparm.c Examining data/fis-gtm-6.3-007/sr_port/op_decrlock.c Examining data/fis-gtm-6.3-007/sr_port/op_div.c Examining data/fis-gtm-6.3-007/sr_port/op_dmode.c Examining data/fis-gtm-6.3-007/sr_port/op_dt_false.c Examining data/fis-gtm-6.3-007/sr_port/op_dt_get.c Examining data/fis-gtm-6.3-007/sr_port/op_dt_store.c Examining data/fis-gtm-6.3-007/sr_port/op_dt_true.c Examining data/fis-gtm-6.3-007/sr_port/op_exfunret.c Examining data/fis-gtm-6.3-007/sr_port/op_exfunretals.c Examining data/fis-gtm-6.3-007/sr_port/op_exp.c Examining data/fis-gtm-6.3-007/sr_port/op_fnascii.c Examining data/fis-gtm-6.3-007/sr_port/op_fnchar.c Examining data/fis-gtm-6.3-007/sr_port/op_fndata.c Examining data/fis-gtm-6.3-007/sr_port/op_fnfind.c Examining data/fis-gtm-6.3-007/sr_port/op_fnfnumber.c Examining data/fis-gtm-6.3-007/sr_port/op_fnget1.c Examining data/fis-gtm-6.3-007/sr_port/op_fnget2.c Examining data/fis-gtm-6.3-007/sr_port/op_fngvget.c Examining data/fis-gtm-6.3-007/sr_port/op_fngvget1.c Examining data/fis-gtm-6.3-007/sr_port/op_fnincr.c Examining data/fis-gtm-6.3-007/sr_port/op_fnj2.c Examining data/fis-gtm-6.3-007/sr_port/op_fnj3.c Examining data/fis-gtm-6.3-007/sr_port/op_fnlength.c Examining data/fis-gtm-6.3-007/sr_port/op_fnlvname.c Examining data/fis-gtm-6.3-007/sr_port/op_fnlvnameo2.c Examining data/fis-gtm-6.3-007/sr_port/op_fnlvprvname.c Examining data/fis-gtm-6.3-007/sr_port/op_fnname.c Examining data/fis-gtm-6.3-007/sr_port/op_fnnext.c Examining data/fis-gtm-6.3-007/sr_port/op_fno2.c Examining data/fis-gtm-6.3-007/sr_port/op_fnorder.c Examining data/fis-gtm-6.3-007/sr_port/op_fnqlength.c Examining data/fis-gtm-6.3-007/sr_port/op_fnqsubscript.c Examining data/fis-gtm-6.3-007/sr_port/op_fnquery.c Examining data/fis-gtm-6.3-007/sr_port/op_fnreverse.c Examining data/fis-gtm-6.3-007/sr_port/op_fnstack1.c Examining data/fis-gtm-6.3-007/sr_port/op_fnstack2.c Examining data/fis-gtm-6.3-007/sr_port/op_fntext.c Examining data/fis-gtm-6.3-007/sr_port/op_fntranslate.c Examining data/fis-gtm-6.3-007/sr_port/op_fnview.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzahandle.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzatransform.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitand.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitcoun.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitfind.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitget.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitlen.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitnot.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitor.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitset.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitstr.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitxor.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzcollate.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzdata.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzdate.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzjobexam.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzm.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzp1.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzpiece.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzpopulation.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzprevious.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzqgblmod.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzsearch.h Examining data/fis-gtm-6.3-007/sr_port/op_fnzsigproc.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzsubstr.c Examining data/fis-gtm-6.3-007/sr_port/op_fnztrigger.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzwidth.c Examining data/fis-gtm-6.3-007/sr_port/op_fnzwrite.c Examining data/fis-gtm-6.3-007/sr_port/op_get_msf.c Examining data/fis-gtm-6.3-007/sr_port/op_getindx.c Examining data/fis-gtm-6.3-007/sr_port/op_glvnpop.c Examining data/fis-gtm-6.3-007/sr_port/op_glvnslot.c Examining data/fis-gtm-6.3-007/sr_port/op_gvdata.c Examining data/fis-gtm-6.3-007/sr_port/op_gvextnam.c Examining data/fis-gtm-6.3-007/sr_port/op_gvget.c Examining data/fis-gtm-6.3-007/sr_port/op_gvincr.c Examining data/fis-gtm-6.3-007/sr_port/op_gvkill.c Examining data/fis-gtm-6.3-007/sr_port/op_gvnaked.c Examining data/fis-gtm-6.3-007/sr_port/op_gvname.c Examining data/fis-gtm-6.3-007/sr_port/op_gvnext.c Examining data/fis-gtm-6.3-007/sr_port/op_gvo2.c Examining data/fis-gtm-6.3-007/sr_port/op_gvorder.c Examining data/fis-gtm-6.3-007/sr_port/op_gvput.c Examining data/fis-gtm-6.3-007/sr_port/op_gvquery.c Examining data/fis-gtm-6.3-007/sr_port/op_gvqueryget.c Examining data/fis-gtm-6.3-007/sr_port/op_gvrectarg.c Examining data/fis-gtm-6.3-007/sr_port/op_gvsavtarg.c Examining data/fis-gtm-6.3-007/sr_port/op_gvzwithdraw.c Examining data/fis-gtm-6.3-007/sr_port/op_gvzwrite.c Examining data/fis-gtm-6.3-007/sr_port/op_hang.c Examining data/fis-gtm-6.3-007/sr_port/op_hardret.c Examining data/fis-gtm-6.3-007/sr_port/op_idiv.c Examining data/fis-gtm-6.3-007/sr_port/op_igetdst.c Examining data/fis-gtm-6.3-007/sr_port/op_igetsrc.c Examining data/fis-gtm-6.3-007/sr_port/op_incrlock.c Examining data/fis-gtm-6.3-007/sr_port/op_inddevparms.c Examining data/fis-gtm-6.3-007/sr_port/op_indfnname.c Examining data/fis-gtm-6.3-007/sr_port/op_indfnname2.c Examining data/fis-gtm-6.3-007/sr_port/op_indfun.c Examining data/fis-gtm-6.3-007/sr_port/op_indget1.c Examining data/fis-gtm-6.3-007/sr_port/op_indget2.c Examining data/fis-gtm-6.3-007/sr_port/op_indglvn.c Examining data/fis-gtm-6.3-007/sr_port/op_indincr.c Examining data/fis-gtm-6.3-007/sr_port/op_indlvadr.c Examining data/fis-gtm-6.3-007/sr_port/op_indlvarg.c Examining data/fis-gtm-6.3-007/sr_port/op_indlvnamadr.c Examining data/fis-gtm-6.3-007/sr_port/op_indmerge.c Examining data/fis-gtm-6.3-007/sr_port/op_indmerge2.c Examining data/fis-gtm-6.3-007/sr_port/op_indname.c Examining data/fis-gtm-6.3-007/sr_port/op_indo2.c Examining data/fis-gtm-6.3-007/sr_port/op_indpat.c Examining data/fis-gtm-6.3-007/sr_port/op_indrzshow.c Examining data/fis-gtm-6.3-007/sr_port/op_indsavglvn.c Examining data/fis-gtm-6.3-007/sr_port/op_indsavlvn.c Examining data/fis-gtm-6.3-007/sr_port/op_indset.c Examining data/fis-gtm-6.3-007/sr_port/op_indtext.c Examining data/fis-gtm-6.3-007/sr_port/op_iocontrol.c Examining data/fis-gtm-6.3-007/sr_port/op_iretmval.c Examining data/fis-gtm-6.3-007/sr_port/op_kill.c Examining data/fis-gtm-6.3-007/sr_port/op_killalias.c Examining data/fis-gtm-6.3-007/sr_port/op_killaliasall.c Examining data/fis-gtm-6.3-007/sr_port/op_killall.c Examining data/fis-gtm-6.3-007/sr_port/op_labaddr.c Examining data/fis-gtm-6.3-007/sr_port/op_litc.c Examining data/fis-gtm-6.3-007/sr_port/op_lkinit.c Examining data/fis-gtm-6.3-007/sr_port/op_lkname.c Examining data/fis-gtm-6.3-007/sr_port/op_lock.c Examining data/fis-gtm-6.3-007/sr_port/op_lock2.c Examining data/fis-gtm-6.3-007/sr_port/op_lvpatwrite.c Examining data/fis-gtm-6.3-007/sr_port/op_lvzwithdraw.c Examining data/fis-gtm-6.3-007/sr_port/op_lvzwrite.c Examining data/fis-gtm-6.3-007/sr_port/op_m_srchindx.c Examining data/fis-gtm-6.3-007/sr_port/op_merge.c Examining data/fis-gtm-6.3-007/sr_port/op_merge.h Examining data/fis-gtm-6.3-007/sr_port/op_merge_arg.c Examining data/fis-gtm-6.3-007/sr_port/op_mul.c Examining data/fis-gtm-6.3-007/sr_port/op_newintrinsic.c Examining data/fis-gtm-6.3-007/sr_port/op_newvar.c Examining data/fis-gtm-6.3-007/sr_port/op_nullexp.c Examining data/fis-gtm-6.3-007/sr_port/op_oldvar.c Examining data/fis-gtm-6.3-007/sr_port/op_open.c Examining data/fis-gtm-6.3-007/sr_port/op_open_dummy.c Examining data/fis-gtm-6.3-007/sr_port/op_putindx.c Examining data/fis-gtm-6.3-007/sr_port/op_rdone.c Examining data/fis-gtm-6.3-007/sr_port/op_read.c Examining data/fis-gtm-6.3-007/sr_port/op_readfl.c Examining data/fis-gtm-6.3-007/sr_port/op_rfrshgvn.c Examining data/fis-gtm-6.3-007/sr_port/op_rfrshlvn.c Examining data/fis-gtm-6.3-007/sr_port/op_rhdaddr.c Examining data/fis-gtm-6.3-007/sr_port/op_rterror.c Examining data/fis-gtm-6.3-007/sr_port/op_savgvn.c Examining data/fis-gtm-6.3-007/sr_port/op_savlvn.c Examining data/fis-gtm-6.3-007/sr_port/op_setals2als.c Examining data/fis-gtm-6.3-007/sr_port/op_setalsct2alsct.c Examining data/fis-gtm-6.3-007/sr_port/op_setalsctin2als.c Examining data/fis-gtm-6.3-007/sr_port/op_setalsin2alsct.c Examining data/fis-gtm-6.3-007/sr_port/op_setfnretin2als.c Examining data/fis-gtm-6.3-007/sr_port/op_setfnretin2alsct.c Examining data/fis-gtm-6.3-007/sr_port/op_setzbrk.c Examining data/fis-gtm-6.3-007/sr_port/op_setzextract.c Examining data/fis-gtm-6.3-007/sr_port/op_setzp1.c Examining data/fis-gtm-6.3-007/sr_port/op_setzpiece.c Examining data/fis-gtm-6.3-007/sr_port/op_shareslot.c Examining data/fis-gtm-6.3-007/sr_port/op_srchindx.c Examining data/fis-gtm-6.3-007/sr_port/op_stoglvn.c Examining data/fis-gtm-6.3-007/sr_port/op_stolitc.c Examining data/fis-gtm-6.3-007/sr_port/op_svget.c Examining data/fis-gtm-6.3-007/sr_port/op_svput.c Examining data/fis-gtm-6.3-007/sr_port/op_tcommit.c Examining data/fis-gtm-6.3-007/sr_port/op_tcommit.h Examining data/fis-gtm-6.3-007/sr_port/op_trestart.c Examining data/fis-gtm-6.3-007/sr_port/op_trollback.c Examining data/fis-gtm-6.3-007/sr_port/op_tstart.c Examining data/fis-gtm-6.3-007/sr_port/op_unlock.c Examining data/fis-gtm-6.3-007/sr_port/op_unwind.c Examining data/fis-gtm-6.3-007/sr_port/op_use.c Examining data/fis-gtm-6.3-007/sr_port/op_view.c Examining data/fis-gtm-6.3-007/sr_port/op_write.c Examining data/fis-gtm-6.3-007/sr_port/op_wteol.c Examining data/fis-gtm-6.3-007/sr_port/op_wtff.c Examining data/fis-gtm-6.3-007/sr_port/op_wtone.c Examining data/fis-gtm-6.3-007/sr_port/op_wttab.c Examining data/fis-gtm-6.3-007/sr_port/op_xkill.c Examining data/fis-gtm-6.3-007/sr_port/op_xnew.c Examining data/fis-gtm-6.3-007/sr_port/op_zallocate.c Examining data/fis-gtm-6.3-007/sr_port/op_zbreak.c Examining data/fis-gtm-6.3-007/sr_port/op_zcompile.c Examining data/fis-gtm-6.3-007/sr_port/op_zcont.c Examining data/fis-gtm-6.3-007/sr_port/op_zdealloc2.c Examining data/fis-gtm-6.3-007/sr_port/op_zdeallocate.c Examining data/fis-gtm-6.3-007/sr_port/op_zg1.c Examining data/fis-gtm-6.3-007/sr_port/op_zgoto.c Examining data/fis-gtm-6.3-007/sr_port/op_zhalt.c Examining data/fis-gtm-6.3-007/sr_port/op_zprevious.c Examining data/fis-gtm-6.3-007/sr_port/op_zprint.c Examining data/fis-gtm-6.3-007/sr_port/op_zshow.c Examining data/fis-gtm-6.3-007/sr_port/op_zst_break.c Examining data/fis-gtm-6.3-007/sr_port/op_zst_over.c Examining data/fis-gtm-6.3-007/sr_port/op_zstep.c Examining data/fis-gtm-6.3-007/sr_port/op_zstepret.c Examining data/fis-gtm-6.3-007/sr_port/op_zsystem.c Examining data/fis-gtm-6.3-007/sr_port/op_ztcommit.c Examining data/fis-gtm-6.3-007/sr_port/op_ztstart.c Examining data/fis-gtm-6.3-007/sr_port/op_zwritesvn.c Examining data/fis-gtm-6.3-007/sr_port/opcode.h Examining data/fis-gtm-6.3-007/sr_port/opcode_def.h Examining data/fis-gtm-6.3-007/sr_port/outofband.h Examining data/fis-gtm-6.3-007/sr_port/outofband_action.c Examining data/fis-gtm-6.3-007/sr_port/outofband_clear.c Examining data/fis-gtm-6.3-007/sr_port/parm_pool.c Examining data/fis-gtm-6.3-007/sr_port/parm_pool.h Examining data/fis-gtm-6.3-007/sr_port/parse_trctbl_groups.c Examining data/fis-gtm-6.3-007/sr_port/parse_trctbl_groups.h Examining data/fis-gtm-6.3-007/sr_port/parse_until_rparen_or_space.c Examining data/fis-gtm-6.3-007/sr_port/pat_compress.c Examining data/fis-gtm-6.3-007/sr_port/pat_unwind.c Examining data/fis-gtm-6.3-007/sr_port/patcode.h Examining data/fis-gtm-6.3-007/sr_port/patmaskseq.c Examining data/fis-gtm-6.3-007/sr_port/patstr.c Examining data/fis-gtm-6.3-007/sr_port/pattab.c Examining data/fis-gtm-6.3-007/sr_port/performcaslatchcheck.c Examining data/fis-gtm-6.3-007/sr_port/performcaslatchcheck.h Examining data/fis-gtm-6.3-007/sr_port/preemptive_db_clnup.c Examining data/fis-gtm-6.3-007/sr_port/preemptive_db_clnup.h Examining data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c Examining data/fis-gtm-6.3-007/sr_port/print_exit_stats.c Examining data/fis-gtm-6.3-007/sr_port/print_exit_stats.h Examining data/fis-gtm-6.3-007/sr_port/print_target.c Examining data/fis-gtm-6.3-007/sr_port/print_target.h Examining data/fis-gtm-6.3-007/sr_port/private_code_copy.h Examining data/fis-gtm-6.3-007/sr_port/process_deferred_stale.c Examining data/fis-gtm-6.3-007/sr_port/process_deferred_stale.h Examining data/fis-gtm-6.3-007/sr_port/process_gvt_pending_list.c Examining data/fis-gtm-6.3-007/sr_port/process_gvt_pending_list.h Examining data/fis-gtm-6.3-007/sr_port/promodemo.c Examining data/fis-gtm-6.3-007/sr_port/promodemo.h Examining data/fis-gtm-6.3-007/sr_port/push_lvval.c Examining data/fis-gtm-6.3-007/sr_port/push_lvval.h Examining data/fis-gtm-6.3-007/sr_port/push_mval.c Examining data/fis-gtm-6.3-007/sr_port/push_stck.c Examining data/fis-gtm-6.3-007/sr_port/push_tval.c Examining data/fis-gtm-6.3-007/sr_port/push_tval.h Examining data/fis-gtm-6.3-007/sr_port/put_cdlt.c Examining data/fis-gtm-6.3-007/sr_port/put_ilit.c Examining data/fis-gtm-6.3-007/sr_port/put_indr.c Examining data/fis-gtm-6.3-007/sr_port/put_lit.c Examining data/fis-gtm-6.3-007/sr_port/put_mfun.c Examining data/fis-gtm-6.3-007/sr_port/put_mlab.c Examining data/fis-gtm-6.3-007/sr_port/put_mmseg.c Examining data/fis-gtm-6.3-007/sr_port/put_mnxl.c Examining data/fis-gtm-6.3-007/sr_port/put_mvar.c Examining data/fis-gtm-6.3-007/sr_port/put_ocnt.c Examining data/fis-gtm-6.3-007/sr_port/put_str.c Examining data/fis-gtm-6.3-007/sr_port/put_tjmp.c Examining data/fis-gtm-6.3-007/sr_port/put_tnxt.c Examining data/fis-gtm-6.3-007/sr_port/put_tref.c Examining data/fis-gtm-6.3-007/sr_port/put_tsiz.c Examining data/fis-gtm-6.3-007/sr_port/rc_cpt_ops.h Examining data/fis-gtm-6.3-007/sr_port/rc_oflow.h Examining data/fis-gtm-6.3-007/sr_port/read_db_files_from_gld.c Examining data/fis-gtm-6.3-007/sr_port/read_db_files_from_gld.h Examining data/fis-gtm-6.3-007/sr_port/real_len.c Examining data/fis-gtm-6.3-007/sr_port/real_len.h Examining data/fis-gtm-6.3-007/sr_port/region_freeze.c Examining data/fis-gtm-6.3-007/sr_port/region_init.c Examining data/fis-gtm-6.3-007/sr_port/region_init_ch.c Examining data/fis-gtm-6.3-007/sr_port/reinit_compilation_externs.c Examining data/fis-gtm-6.3-007/sr_port/reinit_compilation_externs.h Examining data/fis-gtm-6.3-007/sr_port/rel_mmseg.c Examining data/fis-gtm-6.3-007/sr_port/rel_quant.h Examining data/fis-gtm-6.3-007/sr_port/release_private_code_copy.c Examining data/fis-gtm-6.3-007/sr_port/relqop.h Examining data/fis-gtm-6.3-007/sr_port/relqueop.c Examining data/fis-gtm-6.3-007/sr_port/relqueopi.c Examining data/fis-gtm-6.3-007/sr_port/relqueopi.h Examining data/fis-gtm-6.3-007/sr_port/rename_file_if_exists.c Examining data/fis-gtm-6.3-007/sr_port/reorg_funcs.c Examining data/fis-gtm-6.3-007/sr_port/repl_comm.c Examining data/fis-gtm-6.3-007/sr_port/repl_comm.h Examining data/fis-gtm-6.3-007/sr_port/repl_ctl.h Examining data/fis-gtm-6.3-007/sr_port/repl_dbg.h Examining data/fis-gtm-6.3-007/sr_port/repl_dbg_disable.h Examining data/fis-gtm-6.3-007/sr_port/repl_dbg_enable.h Examining data/fis-gtm-6.3-007/sr_port/repl_errno.c Examining data/fis-gtm-6.3-007/sr_port/repl_errno.h Examining data/fis-gtm-6.3-007/sr_port/repl_filter.c Examining data/fis-gtm-6.3-007/sr_port/repl_filter.h Examining data/fis-gtm-6.3-007/sr_port/repl_log.h Examining data/fis-gtm-6.3-007/sr_port/repl_phase2_cleanup.c Examining data/fis-gtm-6.3-007/sr_port/repl_phase2_salvage.c Examining data/fis-gtm-6.3-007/sr_port/repl_shutdcode.h Examining data/fis-gtm-6.3-007/sr_port/repl_sort_tr_buff.c Examining data/fis-gtm-6.3-007/sr_port/repl_sort_tr_buff.h Examining data/fis-gtm-6.3-007/sr_port/repl_tr_good.c Examining data/fis-gtm-6.3-007/sr_port/repl_tr_good.h Examining data/fis-gtm-6.3-007/sr_port/replgbl.h Examining data/fis-gtm-6.3-007/sr_port/replic_gbldefs.c Examining data/fis-gtm-6.3-007/sr_port/replication_ch.c Examining data/fis-gtm-6.3-007/sr_port/resolve_blocks.c Examining data/fis-gtm-6.3-007/sr_port/resolve_blocks.h Examining data/fis-gtm-6.3-007/sr_port/resolve_lab.c Examining data/fis-gtm-6.3-007/sr_port/resolve_lab.h Examining data/fis-gtm-6.3-007/sr_port/resolve_optimize.c Examining data/fis-gtm-6.3-007/sr_port/resolve_ref.c Examining data/fis-gtm-6.3-007/sr_port/restrict.c Examining data/fis-gtm-6.3-007/sr_port/restrict.h Examining data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.c Examining data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.h Examining data/fis-gtm-6.3-007/sr_port/rtnlaboff2entryref.c Examining data/fis-gtm-6.3-007/sr_port/rwformat.c Examining data/fis-gtm-6.3-007/sr_port/rwformat.h Examining data/fis-gtm-6.3-007/sr_port/s2n.c Examining data/fis-gtm-6.3-007/sr_port/s2pool.c Examining data/fis-gtm-6.3-007/sr_port/s2pool_align.c Examining data/fis-gtm-6.3-007/sr_port/s2pool_concat.c Examining data/fis-gtm-6.3-007/sr_port/sec_shr_blk_build.c Examining data/fis-gtm-6.3-007/sr_port/sec_shr_blk_build.h Examining data/fis-gtm-6.3-007/sr_port/sec_shr_map_build.c Examining data/fis-gtm-6.3-007/sr_port/sec_shr_map_build.h Examining data/fis-gtm-6.3-007/sr_port/secshr_blk_full_build.c Examining data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c Examining data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.h Examining data/fis-gtm-6.3-007/sr_port/secshr_finish_CMT08_to_CMT14.c Examining data/fis-gtm-6.3-007/sr_port/secshr_finish_CMT18.c Examining data/fis-gtm-6.3-007/sr_port/secshr_finish_CMT18_to_CMT19.c Examining data/fis-gtm-6.3-007/sr_port/secshr_rel_crit.c Examining data/fis-gtm-6.3-007/sr_port/secshr_send_DBCLNUPINFO_msg.c Examining data/fis-gtm-6.3-007/sr_port/semwt2long_handler.c Examining data/fis-gtm-6.3-007/sr_port/semwt2long_handler.h Examining data/fis-gtm-6.3-007/sr_port/send_msg.h Examining data/fis-gtm-6.3-007/sr_port/set_gbuff_limit.c Examining data/fis-gtm-6.3-007/sr_port/set_gbuff_limit.h Examining data/fis-gtm-6.3-007/sr_port/set_jnl_info.c Examining data/fis-gtm-6.3-007/sr_port/set_num_additional_processors.h Examining data/fis-gtm-6.3-007/sr_port/set_testpoint.c Examining data/fis-gtm-6.3-007/sr_port/setcurtchain.c Examining data/fis-gtm-6.3-007/sr_port/setterm.h Examining data/fis-gtm-6.3-007/sr_port/setzdir.c Examining data/fis-gtm-6.3-007/sr_port/setzdir.h Examining data/fis-gtm-6.3-007/sr_port/seven_2_ascii.c Examining data/fis-gtm-6.3-007/sr_port/seven_2_ascii.h Examining data/fis-gtm-6.3-007/sr_port/sgnl.h Examining data/fis-gtm-6.3-007/sr_port/sgnl_gvnulsubsc.c Examining data/fis-gtm-6.3-007/sr_port/sgnl_gvreplerr.c Examining data/fis-gtm-6.3-007/sr_port/sgnl_gvundef.c Examining data/fis-gtm-6.3-007/sr_port/sgtm_putmsg.h Examining data/fis-gtm-6.3-007/sr_port/shmpool.c Examining data/fis-gtm-6.3-007/sr_port/shmpool.h Examining data/fis-gtm-6.3-007/sr_port/show_source_line.c Examining data/fis-gtm-6.3-007/sr_port/show_source_line.h Examining data/fis-gtm-6.3-007/sr_port/shrink_trips.c Examining data/fis-gtm-6.3-007/sr_port/shuffq.c Examining data/fis-gtm-6.3-007/sr_port/skan_offset.c Examining data/fis-gtm-6.3-007/sr_port/skan_offset.h Examining data/fis-gtm-6.3-007/sr_port/skan_rnum.c Examining data/fis-gtm-6.3-007/sr_port/skan_rnum.h Examining data/fis-gtm-6.3-007/sr_port/skpc.c Examining data/fis-gtm-6.3-007/sr_port/sleep_cnt.h Examining data/fis-gtm-6.3-007/sr_port/sockint_stats.c Examining data/fis-gtm-6.3-007/sr_port/sockint_stats.h Examining data/fis-gtm-6.3-007/sr_port/sorts_after.c Examining data/fis-gtm-6.3-007/sr_port/sorts_after.h Examining data/fis-gtm-6.3-007/sr_port/source_file.h Examining data/fis-gtm-6.3-007/sr_port/spec_type.h Examining data/fis-gtm-6.3-007/sr_port/srcline.h Examining data/fis-gtm-6.3-007/sr_port/stack_frame.h Examining data/fis-gtm-6.3-007/sr_port/start_fetches.c Examining data/fis-gtm-6.3-007/sr_port/start_for_fetches.c Examining data/fis-gtm-6.3-007/sr_port/startup.h Examining data/fis-gtm-6.3-007/sr_port/std_dev_outbndset.h Examining data/fis-gtm-6.3-007/sr_port/stp_expand_array.c Examining data/fis-gtm-6.3-007/sr_port/stp_gcol.c Examining data/fis-gtm-6.3-007/sr_port/stp_gcol_ch.c Examining data/fis-gtm-6.3-007/sr_port/stp_gcol_src.h Examining data/fis-gtm-6.3-007/sr_port/stp_init.c Examining data/fis-gtm-6.3-007/sr_port/stp_move.c Examining data/fis-gtm-6.3-007/sr_port/stp_parms.h Examining data/fis-gtm-6.3-007/sr_port/stpg_sort.c Examining data/fis-gtm-6.3-007/sr_port/stpg_sort.h Examining data/fis-gtm-6.3-007/sr_port/str2gvargs.c Examining data/fis-gtm-6.3-007/sr_port/str2gvargs.h Examining data/fis-gtm-6.3-007/sr_port/str2gvkey.h Examining data/fis-gtm-6.3-007/sr_port/str2gvkey_gvfunc.c Examining data/fis-gtm-6.3-007/sr_port/str2gvkey_nogvfunc.c Examining data/fis-gtm-6.3-007/sr_port/str_to_title.c Examining data/fis-gtm-6.3-007/sr_port/stringpool.h Examining data/fis-gtm-6.3-007/sr_port/strpiecediff.c Examining data/fis-gtm-6.3-007/sr_port/strpiecediff.h Examining data/fis-gtm-6.3-007/sr_port/stx_error.c Examining data/fis-gtm-6.3-007/sr_port/sub2stbl.c Examining data/fis-gtm-6.3-007/sr_port/subscript.h Examining data/fis-gtm-6.3-007/sr_port/svnames.h Examining data/fis-gtm-6.3-007/sr_port/symb_line.c Examining data/fis-gtm-6.3-007/sr_port/symbinit.c Examining data/fis-gtm-6.3-007/sr_port/t_abort.c Examining data/fis-gtm-6.3-007/sr_port/t_abort.h Examining data/fis-gtm-6.3-007/sr_port/t_abort_cleanup.c Examining data/fis-gtm-6.3-007/sr_port/t_begin.c Examining data/fis-gtm-6.3-007/sr_port/t_begin.h Examining data/fis-gtm-6.3-007/sr_port/t_begin_crit.c Examining data/fis-gtm-6.3-007/sr_port/t_begin_crit.h Examining data/fis-gtm-6.3-007/sr_port/t_busy2free.c Examining data/fis-gtm-6.3-007/sr_port/t_busy2free.h Examining data/fis-gtm-6.3-007/sr_port/t_ch.c Examining data/fis-gtm-6.3-007/sr_port/t_commit_cleanup.c Examining data/fis-gtm-6.3-007/sr_port/t_commit_cleanup.h Examining data/fis-gtm-6.3-007/sr_port/t_create.c Examining data/fis-gtm-6.3-007/sr_port/t_create.h Examining data/fis-gtm-6.3-007/sr_port/t_end.c Examining data/fis-gtm-6.3-007/sr_port/t_end.h Examining data/fis-gtm-6.3-007/sr_port/t_end_sysops.c Examining data/fis-gtm-6.3-007/sr_port/t_qread.c Examining data/fis-gtm-6.3-007/sr_port/t_qread.h Examining data/fis-gtm-6.3-007/sr_port/t_retry.c Examining data/fis-gtm-6.3-007/sr_port/t_retry.h Examining data/fis-gtm-6.3-007/sr_port/t_write.c Examining data/fis-gtm-6.3-007/sr_port/t_write.h Examining data/fis-gtm-6.3-007/sr_port/t_write_map.c Examining data/fis-gtm-6.3-007/sr_port/t_write_map.h Examining data/fis-gtm-6.3-007/sr_port/t_write_root.c Examining data/fis-gtm-6.3-007/sr_port/t_write_root.h Examining data/fis-gtm-6.3-007/sr_port/tab_bg_trc_rec.h Examining data/fis-gtm-6.3-007/sr_port/tab_db_csh_acct_rec.h Examining data/fis-gtm-6.3-007/sr_port/tab_gvstats_rec.h Examining data/fis-gtm-6.3-007/sr_port/tab_jpl_trc_rec.h Examining data/fis-gtm-6.3-007/sr_port/targ_alloc.c Examining data/fis-gtm-6.3-007/sr_port/targ_alloc.h Examining data/fis-gtm-6.3-007/sr_port/tcp_open.c Examining data/fis-gtm-6.3-007/sr_port/term_setup.h Examining data/fis-gtm-6.3-007/sr_port/terminate_ch.c Examining data/fis-gtm-6.3-007/sr_port/testpt.h Examining data/fis-gtm-6.3-007/sr_port/time_calc.c Examining data/fis-gtm-6.3-007/sr_port/timeout2msec.c Examining data/fis-gtm-6.3-007/sr_port/timers.h Examining data/fis-gtm-6.3-007/sr_port/tnxtarg.c Examining data/fis-gtm-6.3-007/sr_port/toktyp.h Examining data/fis-gtm-6.3-007/sr_port/tp.h Examining data/fis-gtm-6.3-007/sr_port/tp_change_reg.c Examining data/fis-gtm-6.3-007/sr_port/tp_change_reg.h Examining data/fis-gtm-6.3-007/sr_port/tp_clean_up.c Examining data/fis-gtm-6.3-007/sr_port/tp_cw_list.c Examining data/fis-gtm-6.3-007/sr_port/tp_frame.h Examining data/fis-gtm-6.3-007/sr_port/tp_get_cw.c Examining data/fis-gtm-6.3-007/sr_port/tp_hist.c Examining data/fis-gtm-6.3-007/sr_port/tp_incr_clean_up.c Examining data/fis-gtm-6.3-007/sr_port/tp_incr_commit.c Examining data/fis-gtm-6.3-007/sr_port/tp_incr_commit.h Examining data/fis-gtm-6.3-007/sr_port/tp_restart.c Examining data/fis-gtm-6.3-007/sr_port/tp_restart.h Examining data/fis-gtm-6.3-007/sr_port/tp_set_sgm.c Examining data/fis-gtm-6.3-007/sr_port/tp_set_sgm.h Examining data/fis-gtm-6.3-007/sr_port/tp_tend.c Examining data/fis-gtm-6.3-007/sr_port/tp_timeout.c Examining data/fis-gtm-6.3-007/sr_port/tp_timeout.h Examining data/fis-gtm-6.3-007/sr_port/tp_timeout_dummy.c Examining data/fis-gtm-6.3-007/sr_port/tp_unwind.c Examining data/fis-gtm-6.3-007/sr_port/tp_unwind.h Examining data/fis-gtm-6.3-007/sr_port/tpdefs.c Examining data/fis-gtm-6.3-007/sr_port/trace_table.h Examining data/fis-gtm-6.3-007/sr_port/trace_table_types.h Examining data/fis-gtm-6.3-007/sr_port/trans_code.c Examining data/fis-gtm-6.3-007/sr_port/trans_code_cleanup.c Examining data/fis-gtm-6.3-007/sr_port/trans_code_cleanup.h Examining data/fis-gtm-6.3-007/sr_port/trans_log_name.h Examining data/fis-gtm-6.3-007/sr_port/trans_numeric.c Examining data/fis-gtm-6.3-007/sr_port/trans_numeric.h Examining data/fis-gtm-6.3-007/sr_port/trap_env_init.c Examining data/fis-gtm-6.3-007/sr_port/trap_env_init.h Examining data/fis-gtm-6.3-007/sr_port/tripinit.c Examining data/fis-gtm-6.3-007/sr_port/tt_write_error_set.c Examining data/fis-gtm-6.3-007/sr_port/unary_tail.c Examining data/fis-gtm-6.3-007/sr_port/underr.c Examining data/fis-gtm-6.3-007/sr_port/underr_strict.c Examining data/fis-gtm-6.3-007/sr_port/undx.c Examining data/fis-gtm-6.3-007/sr_port/undx.h Examining data/fis-gtm-6.3-007/sr_port/unuse_literal.c Examining data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c Examining data/fis-gtm-6.3-007/sr_port/unw_prof_frame_dummy.c Examining data/fis-gtm-6.3-007/sr_port/unw_prof_frame_dummy.h Examining data/fis-gtm-6.3-007/sr_port/unw_retarg.c Examining data/fis-gtm-6.3-007/sr_port/unw_retarg.h Examining data/fis-gtm-6.3-007/sr_port/unwind_nocounts.c Examining data/fis-gtm-6.3-007/sr_port/unwind_nocounts.h Examining data/fis-gtm-6.3-007/sr_port/upd_open_files.h Examining data/fis-gtm-6.3-007/sr_port/updhelper_end.c Examining data/fis-gtm-6.3-007/sr_port/updhelper_init.c Examining data/fis-gtm-6.3-007/sr_port/updhelper_reader.c Examining data/fis-gtm-6.3-007/sr_port/updhelper_writer.c Examining data/fis-gtm-6.3-007/sr_port/updproc.c Examining data/fis-gtm-6.3-007/sr_port/updproc.h Examining data/fis-gtm-6.3-007/sr_port/updproc_end.c Examining data/fis-gtm-6.3-007/sr_port/updproc_get_gblname.c Examining data/fis-gtm-6.3-007/sr_port/updproc_get_gblname.h Examining data/fis-gtm-6.3-007/sr_port/updproc_init.c Examining data/fis-gtm-6.3-007/sr_port/updproc_open_files.c Examining data/fis-gtm-6.3-007/sr_port/upper_to_lower.c Examining data/fis-gtm-6.3-007/sr_port/urx.h Examining data/fis-gtm-6.3-007/sr_port/urx_add.c Examining data/fis-gtm-6.3-007/sr_port/urx_addlab.c Examining data/fis-gtm-6.3-007/sr_port/urx_addrtn.c Examining data/fis-gtm-6.3-007/sr_port/urx_free.c Examining data/fis-gtm-6.3-007/sr_port/urx_getlab.c Examining data/fis-gtm-6.3-007/sr_port/urx_getrtn.c Examining data/fis-gtm-6.3-007/sr_port/urx_putlab.c Examining data/fis-gtm-6.3-007/sr_port/urx_putrtn.c Examining data/fis-gtm-6.3-007/sr_port/urx_resolve.c Examining data/fis-gtm-6.3-007/sr_port/urxsp.h Examining data/fis-gtm-6.3-007/sr_port/util.h Examining data/fis-gtm-6.3-007/sr_port/util_base_ch.c Examining data/fis-gtm-6.3-007/sr_port/util_ch.c Examining data/fis-gtm-6.3-007/sr_port/util_format.h Examining data/fis-gtm-6.3-007/sr_port/util_spawn.h Examining data/fis-gtm-6.3-007/sr_port/v010_jnl.h Examining data/fis-gtm-6.3-007/sr_port/v12_jnl_rec_table.h Examining data/fis-gtm-6.3-007/sr_port/v15_gdsbt.h Examining data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h Examining data/fis-gtm-6.3-007/sr_port/v15_gdsroot.h Examining data/fis-gtm-6.3-007/sr_port/v15_tab_bg_trc_rec_fixed.h Examining data/fis-gtm-6.3-007/sr_port/v15_tab_bg_trc_rec_variable.h Examining data/fis-gtm-6.3-007/sr_port/v15_tab_db_csh_acct_rec.h Examining data/fis-gtm-6.3-007/sr_port/val_iscan.c Examining data/fis-gtm-6.3-007/sr_port/valid_labname.c Examining data/fis-gtm-6.3-007/sr_port/valid_mname.c Examining data/fis-gtm-6.3-007/sr_port/valid_mname.h Examining data/fis-gtm-6.3-007/sr_port/vdatsize.h Examining data/fis-gtm-6.3-007/sr_port/verify_queue.c Examining data/fis-gtm-6.3-007/sr_port/view.h Examining data/fis-gtm-6.3-007/sr_port/view_arg_convert.c Examining data/fis-gtm-6.3-007/sr_port/view_jnlfile.c Examining data/fis-gtm-6.3-007/sr_port/view_routines.c Examining data/fis-gtm-6.3-007/sr_port/viewkeys.c Examining data/fis-gtm-6.3-007/sr_port/viewtab.h Examining data/fis-gtm-6.3-007/sr_port/vxi.h Examining data/fis-gtm-6.3-007/sr_port/vxt.h Examining data/fis-gtm-6.3-007/sr_port/wait_for_block_flush.c Examining data/fis-gtm-6.3-007/sr_port/wake.c Examining data/fis-gtm-6.3-007/sr_port/wake.h Examining data/fis-gtm-6.3-007/sr_port/wake_alarm.c Examining data/fis-gtm-6.3-007/sr_port/wake_alarm.h Examining data/fis-gtm-6.3-007/sr_port/walktree.c Examining data/fis-gtm-6.3-007/sr_port/wbox_test_init.c Examining data/fis-gtm-6.3-007/sr_port/wbox_test_init.h Examining data/fis-gtm-6.3-007/sr_port/wcs_backoff.c Examining data/fis-gtm-6.3-007/sr_port/wcs_backoff.h Examining data/fis-gtm-6.3-007/sr_port/wcs_flu.h Examining data/fis-gtm-6.3-007/sr_port/wcs_get_space.h Examining data/fis-gtm-6.3-007/sr_port/wcs_mm_recover.h Examining data/fis-gtm-6.3-007/sr_port/wcs_phase2_commit_wait.c Examining data/fis-gtm-6.3-007/sr_port/wcs_phase2_commit_wait.h Examining data/fis-gtm-6.3-007/sr_port/wcs_read_in_progress_wait.c Examining data/fis-gtm-6.3-007/sr_port/wcs_read_in_progress_wait.h Examining data/fis-gtm-6.3-007/sr_port/wcs_recover.c Examining data/fis-gtm-6.3-007/sr_port/wcs_recover.h Examining data/fis-gtm-6.3-007/sr_port/wcs_sleep.c Examining data/fis-gtm-6.3-007/sr_port/wcs_sleep.h Examining data/fis-gtm-6.3-007/sr_port/wcs_timer_start.h Examining data/fis-gtm-6.3-007/sr_port/wcs_verify.c Examining data/fis-gtm-6.3-007/sr_port/wrtcatopt.c Examining data/fis-gtm-6.3-007/sr_port/xfer.h Examining data/fis-gtm-6.3-007/sr_port/xfer_enum.h Examining data/fis-gtm-6.3-007/sr_port/xfer_name.c Examining data/fis-gtm-6.3-007/sr_port/xfer_table.c Examining data/fis-gtm-6.3-007/sr_port/zbreak.h Examining data/fis-gtm-6.3-007/sr_port/zco_init.c Examining data/fis-gtm-6.3-007/sr_port/zco_init.h Examining data/fis-gtm-6.3-007/sr_port/zdate_form_init.c Examining data/fis-gtm-6.3-007/sr_port/zdate_form_init.h Examining data/fis-gtm-6.3-007/sr_port/zlcompile.c Examining data/fis-gtm-6.3-007/sr_port/zlput_rname.c Examining data/fis-gtm-6.3-007/sr_port/zr_add_zbreak.c Examining data/fis-gtm-6.3-007/sr_port/zr_find.c Examining data/fis-gtm-6.3-007/sr_port/zr_init.c Examining data/fis-gtm-6.3-007/sr_port/zr_remove_zbreak.c Examining data/fis-gtm-6.3-007/sr_port/zr_remove_zbrks.c Examining data/fis-gtm-6.3-007/sr_port/zr_unlink_rtn.c Examining data/fis-gtm-6.3-007/sr_port/zr_unlink_rtn.h Examining data/fis-gtm-6.3-007/sr_port/zro_init.c Examining data/fis-gtm-6.3-007/sr_port/zroutines.h Examining data/fis-gtm-6.3-007/sr_port/zshow.h Examining data/fis-gtm-6.3-007/sr_port/zshow_ch.c Examining data/fis-gtm-6.3-007/sr_port/zshow_format_lock.c Examining data/fis-gtm-6.3-007/sr_port/zshow_gvstats.c Examining data/fis-gtm-6.3-007/sr_port/zshow_locks.c Examining data/fis-gtm-6.3-007/sr_port/zshow_output.c Examining data/fis-gtm-6.3-007/sr_port/zshow_params.h Examining data/fis-gtm-6.3-007/sr_port/zshow_stack.c Examining data/fis-gtm-6.3-007/sr_port/zshow_svn.c Examining data/fis-gtm-6.3-007/sr_port/zshow_zbreaks.c Examining data/fis-gtm-6.3-007/sr_port/zshow_zwrite.c Examining data/fis-gtm-6.3-007/sr_port/zsocket.h Examining data/fis-gtm-6.3-007/sr_port/zsockettab.h Examining data/fis-gtm-6.3-007/sr_port/zstep.h Examining data/fis-gtm-6.3-007/sr_port/ztrap_save_ctxt.c Examining data/fis-gtm-6.3-007/sr_port/ztrap_save_ctxt.h Examining data/fis-gtm-6.3-007/sr_port/zwr2format.c Examining data/fis-gtm-6.3-007/sr_port/zwrite.h Examining data/fis-gtm-6.3-007/sr_port/zyerror_init.c Examining data/fis-gtm-6.3-007/sr_port/zyerror_init.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_action_pending.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_action_pending.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_add_region.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_add_region.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_bind_name.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_bind_name.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_err_compat.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_err_compat.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_exi_handler.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_exi_handler.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_proc.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_proc.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_reghead.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_reghead.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_region.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_region.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_init_ast.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_init_ast.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_int_unpack.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_int_unpack.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_is_query_queryget.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_is_query_queryget.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_jnl_switched.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_jnl_switched.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_link_accept.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_link_accept.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_neterr.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_neterr.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_read_ast.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_read_ast.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_release_name.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_remove_from_action_queue.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_remove_from_action_queue.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_shutdown_ast.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_shutdown_ast.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_urgread_ast.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_write_ast.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_write_ast.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmd.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmd_cst_init.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmd_rundown.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_blklck.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_chklck.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_chkprc.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_chkreg.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_decrlock.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_dolock.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_incrlock.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lckclr.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lcktime.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lkbckout.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lkcancel.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lkhold.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lklist.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lkrundown.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lkstarve.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lock.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lock_internal.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_unlock.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_zallocate.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_zdeallocate.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmlkdef.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_bufflush.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_data.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_get.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_increment.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initproc.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initreg.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_kill.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkacquire.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkcanall.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkcancel.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkdelete.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_clearrep.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_clearreq.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_showrep.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_showreq.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkreqimmed.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkreqnode.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkrequest.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkresume.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lksuspend.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_order.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_protos.h Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_put.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_query.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_terminate.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_terminate_free.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_zprevious.c Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_zwithdraw.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_canremlk.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_data.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_get.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_increment.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_kill.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_order.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_put.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_query.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_reqremlk.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_resremlk.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_susremlk.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_unlock.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_zprevious.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_close.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open_ch.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_remlkmgr.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_remlkmgr.h Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_rundown.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz.h Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_clrlkreq.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_error.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_int_lkcancel.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lkacquire_ast.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lkcancel_ast.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lkread_ast.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lksublist.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lksuspend_ast.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_neterr.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_neterr_set.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_sndlkremove.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_zdef_ast.c Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_zflush.c Examining data/fis-gtm-6.3-007/sr_port_cm/lock_cmtimeout.c Examining data/fis-gtm-6.3-007/sr_port_cm/lock_cmtimeout.h Examining data/fis-gtm-6.3-007/sr_port_cm/per2962.h Examining data/fis-gtm-6.3-007/sr_unix/add_inter.c Examining data/fis-gtm-6.3-007/sr_unix/aio_shim.c Examining data/fis-gtm-6.3-007/sr_unix/anticipatory_freeze.c Examining data/fis-gtm-6.3-007/sr_unix/arlinkdbg.h Examining data/fis-gtm-6.3-007/sr_unix/ast.h Examining data/fis-gtm-6.3-007/sr_unix/auto_zlink.c Examining data/fis-gtm-6.3-007/sr_unix/auto_zlink.h Examining data/fis-gtm-6.3-007/sr_unix/backup_buffer_flush.c Examining data/fis-gtm-6.3-007/sr_unix/bin_load.c Examining data/fis-gtm-6.3-007/sr_unix/bit_op.h Examining data/fis-gtm-6.3-007/sr_unix/callg.c Examining data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c Examining data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.h Examining data/fis-gtm-6.3-007/sr_unix/ccp_cluster_lock_wake.c Examining data/fis-gtm-6.3-007/sr_unix/ccp_fid_msg.c Examining data/fis-gtm-6.3-007/sr_unix/ccp_sendmsg.c Examining data/fis-gtm-6.3-007/sr_unix/ccp_userwait.c Examining data/fis-gtm-6.3-007/sr_unix/ce_init.c Examining data/fis-gtm-6.3-007/sr_unix/ce_substitute.c Examining data/fis-gtm-6.3-007/sr_unix/cenable.c Examining data/fis-gtm-6.3-007/sr_unix/cenable.h Examining data/fis-gtm-6.3-007/sr_unix/ch_cond_core.c Examining data/fis-gtm-6.3-007/sr_unix/ch_overrun.c Examining data/fis-gtm-6.3-007/sr_unix/change_fhead_timer.c Examining data/fis-gtm-6.3-007/sr_unix/ci_ret_code.c Examining data/fis-gtm-6.3-007/sr_unix/clear_cache_array.c Examining data/fis-gtm-6.3-007/sr_unix/clear_cache_array.h Examining data/fis-gtm-6.3-007/sr_unix/cli.c Examining data/fis-gtm-6.3-007/sr_unix/cli.h Examining data/fis-gtm-6.3-007/sr_unix/cli_disallow.c Examining data/fis-gtm-6.3-007/sr_unix/cli_disallow.h Examining data/fis-gtm-6.3-007/sr_unix/cli_lex.c Examining data/fis-gtm-6.3-007/sr_unix/cli_parse.c Examining data/fis-gtm-6.3-007/sr_unix/cli_parse.h Examining data/fis-gtm-6.3-007/sr_unix/cmidefsp.h Examining data/fis-gtm-6.3-007/sr_unix/cmistub.c Examining data/fis-gtm-6.3-007/sr_unix/comp_lits.c Examining data/fis-gtm-6.3-007/sr_unix/condstk_expand.c Examining data/fis-gtm-6.3-007/sr_unix/continue_handler.c Examining data/fis-gtm-6.3-007/sr_unix/continue_handler.h Examining data/fis-gtm-6.3-007/sr_unix/continue_proc.c Examining data/fis-gtm-6.3-007/sr_unix/crit_wake.c Examining data/fis-gtm-6.3-007/sr_unix/ctrap_set.c Examining data/fis-gtm-6.3-007/sr_unix/ctrlc_handler.c Examining data/fis-gtm-6.3-007/sr_unix/ctrlc_handler.h Examining data/fis-gtm-6.3-007/sr_unix/ctrlc_set.c Examining data/fis-gtm-6.3-007/sr_unix/ctrly_set.c Examining data/fis-gtm-6.3-007/sr_unix/cvtprot.c Examining data/fis-gtm-6.3-007/sr_unix/cvttime.c Examining data/fis-gtm-6.3-007/sr_unix/daemon_crit.c Examining data/fis-gtm-6.3-007/sr_unix/db_ipcs_reset.c Examining data/fis-gtm-6.3-007/sr_unix/db_ipcs_reset.h Examining data/fis-gtm-6.3-007/sr_unix/db_read.h Examining data/fis-gtm-6.3-007/sr_unix/db_snapshot.h Examining data/fis-gtm-6.3-007/sr_unix/db_write.h Examining data/fis-gtm-6.3-007/sr_unix/db_write_eof_block.c Examining data/fis-gtm-6.3-007/sr_unix/db_write_eof_block.h Examining data/fis-gtm-6.3-007/sr_unix/dbcertify_cmd.c Examining data/fis-gtm-6.3-007/sr_unix/dbcertify_dbfilop.c Examining data/fis-gtm-6.3-007/sr_unix/dbcertify_deferred_signal_handler.c Examining data/fis-gtm-6.3-007/sr_unix/dbcertify_parse_and_dispatch.c Examining data/fis-gtm-6.3-007/sr_unix/dbcertify_signal_handler.c Examining data/fis-gtm-6.3-007/sr_unix/dbfilop.c Examining data/fis-gtm-6.3-007/sr_unix/dbinit_ch.c Examining data/fis-gtm-6.3-007/sr_unix/dec_err.c Examining data/fis-gtm-6.3-007/sr_unix/deferred_signal_handler.c Examining data/fis-gtm-6.3-007/sr_unix/deferred_signal_handler.h Examining data/fis-gtm-6.3-007/sr_unix/disk_block_available.c Examining data/fis-gtm-6.3-007/sr_unix/disk_block_available.h Examining data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c Examining data/fis-gtm-6.3-007/sr_unix/dm_audit_log.h Examining data/fis-gtm-6.3-007/sr_unix/dm_read.c Examining data/fis-gtm-6.3-007/sr_unix/do_semop.c Examining data/fis-gtm-6.3-007/sr_unix/do_semop.h Examining data/fis-gtm-6.3-007/sr_unix/do_shmat.c Examining data/fis-gtm-6.3-007/sr_unix/do_shmat.h Examining data/fis-gtm-6.3-007/sr_unix/do_verify.c Examining data/fis-gtm-6.3-007/sr_unix/do_xform.c Examining data/fis-gtm-6.3-007/sr_unix/dollarh.c Examining data/fis-gtm-6.3-007/sr_unix/dollarh.h Examining data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c Examining data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.h Examining data/fis-gtm-6.3-007/sr_unix/dse.c Examining data/fis-gtm-6.3-007/sr_unix/dse_cmd.c Examining data/fis-gtm-6.3-007/sr_unix/dse_cmd_disallow.c Examining data/fis-gtm-6.3-007/sr_unix/dse_cmd_disallow.h Examining data/fis-gtm-6.3-007/sr_unix/dse_ctrlc_handler.c Examining data/fis-gtm-6.3-007/sr_unix/dse_help.c Examining data/fis-gtm-6.3-007/sr_unix/dse_open.c Examining data/fis-gtm-6.3-007/sr_unix/dse_puttime.c Examining data/fis-gtm-6.3-007/sr_unix/dse_remove.c Examining data/fis-gtm-6.3-007/sr_unix/dsk_read.c Examining data/fis-gtm-6.3-007/sr_unix/dsk_write_nocache.c Examining data/fis-gtm-6.3-007/sr_unix/eintr_wrapper_semop.h Examining data/fis-gtm-6.3-007/sr_unix/err_init.c Examining data/fis-gtm-6.3-007/sr_unix/error_return.c Examining data/fis-gtm-6.3-007/sr_unix/errorsp.h Examining data/fis-gtm-6.3-007/sr_unix/exi_ch.c Examining data/fis-gtm-6.3-007/sr_unix/extract_signal_info.c Examining data/fis-gtm-6.3-007/sr_unix/exttab_parse.c Examining data/fis-gtm-6.3-007/sr_unix/exttime.c Examining data/fis-gtm-6.3-007/sr_unix/f_char.c Examining data/fis-gtm-6.3-007/sr_unix/f_piece.c Examining data/fis-gtm-6.3-007/sr_unix/fake_enospc.c Examining data/fis-gtm-6.3-007/sr_unix/fake_enospc.h Examining data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c Examining data/fis-gtm-6.3-007/sr_unix/fgncalsp.h Examining data/fis-gtm-6.3-007/sr_unix/file_head_read.c Examining data/fis-gtm-6.3-007/sr_unix/file_head_write.c Examining data/fis-gtm-6.3-007/sr_unix/file_input.c Examining data/fis-gtm-6.3-007/sr_unix/file_input.h Examining data/fis-gtm-6.3-007/sr_unix/filestruct.h Examining data/fis-gtm-6.3-007/sr_unix/fix_pages.c Examining data/fis-gtm-6.3-007/sr_unix/forced_exit_err_display.c Examining data/fis-gtm-6.3-007/sr_unix/forced_exit_err_display.h Examining data/fis-gtm-6.3-007/sr_unix/fork_init.h Examining data/fis-gtm-6.3-007/sr_unix/ftok.c Examining data/fis-gtm-6.3-007/sr_unix/ftok_sem_get_common.c Examining data/fis-gtm-6.3-007/sr_unix/ftok_sem_incrcnt.c Examining data/fis-gtm-6.3-007/sr_unix/ftok_sem_incrcnt.h Examining data/fis-gtm-6.3-007/sr_unix/ftok_sems.c Examining data/fis-gtm-6.3-007/sr_unix/ftok_sems.h Examining data/fis-gtm-6.3-007/sr_unix/gbldirnam.h Examining data/fis-gtm-6.3-007/sr_unix/gcall.h Examining data/fis-gtm-6.3-007/sr_unix/gds_file_size.c Examining data/fis-gtm-6.3-007/sr_unix/gds_rundown.c Examining data/fis-gtm-6.3-007/sr_unix/gds_rundown_ch.c Examining data/fis-gtm-6.3-007/sr_unix/gds_rundown_err_cleanup.c Examining data/fis-gtm-6.3-007/sr_unix/gds_rundown_err_cleanup.h Examining data/fis-gtm-6.3-007/sr_unix/gdsfheadsp.h Examining data/fis-gtm-6.3-007/sr_unix/gdsfilext.c Examining data/fis-gtm-6.3-007/sr_unix/gdsfilext_nojnl.c Examining data/fis-gtm-6.3-007/sr_unix/gdsfilext_nojnl.h Examining data/fis-gtm-6.3-007/sr_unix/generic_signal_handler.c Examining data/fis-gtm-6.3-007/sr_unix/generic_signal_handler.h Examining data/fis-gtm-6.3-007/sr_unix/genpat.c Examining data/fis-gtm-6.3-007/sr_unix/get_command_line.c Examining data/fis-gtm-6.3-007/sr_unix/get_full_path.c Examining data/fis-gtm-6.3-007/sr_unix/get_page_size.c Examining data/fis-gtm-6.3-007/sr_unix/get_src_line.c Examining data/fis-gtm-6.3-007/sr_unix/get_ztimeout.c Examining data/fis-gtm-6.3-007/sr_unix/getcaps.c Examining data/fis-gtm-6.3-007/sr_unix/getcaps.h Examining data/fis-gtm-6.3-007/sr_unix/geteditor.c Examining data/fis-gtm-6.3-007/sr_unix/geteditor.h Examining data/fis-gtm-6.3-007/sr_unix/geteuid.c Examining data/fis-gtm-6.3-007/sr_unix/getjobnum.c Examining data/fis-gtm-6.3-007/sr_unix/getmaxfds.c Examining data/fis-gtm-6.3-007/sr_unix/getmaxfds.h Examining data/fis-gtm-6.3-007/sr_unix/getstorage.c Examining data/fis-gtm-6.3-007/sr_unix/getzmode.c Examining data/fis-gtm-6.3-007/sr_unix/getzprocess.c Examining data/fis-gtm-6.3-007/sr_unix/go_load.c Examining data/fis-gtm-6.3-007/sr_unix/golevel.c Examining data/fis-gtm-6.3-007/sr_unix/goq_load.c Examining data/fis-gtm-6.3-007/sr_unix/grab_crit.c Examining data/fis-gtm-6.3-007/sr_unix/grab_crit_encr_cycle_sync.c Examining data/fis-gtm-6.3-007/sr_unix/grab_crit_immediate.c Examining data/fis-gtm-6.3-007/sr_unix/grab_latch.c Examining data/fis-gtm-6.3-007/sr_unix/grab_lock.c Examining data/fis-gtm-6.3-007/sr_unix/gt_timer.h Examining data/fis-gtm-6.3-007/sr_unix/gt_timers.c Examining data/fis-gtm-6.3-007/sr_unix/gt_timers_add_safe_hndlrs.c Examining data/fis-gtm-6.3-007/sr_unix/gt_timers_add_safe_hndlrs.h Examining data/fis-gtm-6.3-007/sr_unix/gtcmstub.c Examining data/fis-gtm-6.3-007/sr_unix/gtcmtrstub.c Examining data/fis-gtm-6.3-007/sr_unix/gtm.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_aio.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_asm_establish.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_bintim.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace_semop.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace_semop.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_compile.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_compile.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_conv.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_conv.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_conv_init.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_dbjnl_dupfd_check.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_dbjnl_dupfd_check.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_descript.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_dump.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_dump_core.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_env_translate.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_exit_handler.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_exit_handler.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_fd_trace.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_file_remove.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_file_stat.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_filter_command.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_filter_command.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_ftok.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_getpwuid.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_icu.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_icu.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_icu_api.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_image_exit.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_init_env.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_ipc.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_is_main_thread.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_isanlp.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_isanlp.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_logicals.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_main.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_main.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_multi_proc.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_multi_proc.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_multi_thread.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_multi_thread.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_permissions.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_permissions.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_pipe.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_pipe.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_poll.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_post_startup_check_init.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_post_startup_check_init.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_pthread.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_pthread_init_key.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_pthread_init_key.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_putmsg.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_putmsg_list.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_rel_quant.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_rename.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_repl_multi_inst.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_sem.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_semaphore.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_semutils.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_semutils.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_signal.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_startup.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_startup.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_statvfs.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_stdio.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_syslog.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_system.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_term.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_termios.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_text_alloc.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_times.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls_funclist.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_tparm.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_tparm.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_tputs.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_tputs.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_trigger.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_trigger_trc.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_ulimit.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_unique_file_util.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_unlink_all.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_unlink_all.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_utf8.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_utf8.h Examining data/fis-gtm-6.3-007/sr_unix/gtm_wake.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_zlib.c Examining data/fis-gtm-6.3-007/sr_unix/gtm_zlib.h Examining data/fis-gtm-6.3-007/sr_unix/gtmci.c Examining data/fis-gtm-6.3-007/sr_unix/gtmci.h Examining data/fis-gtm-6.3-007/sr_unix/gtmci_ch.c Examining data/fis-gtm-6.3-007/sr_unix/gtmci_isv.c Examining data/fis-gtm-6.3-007/sr_unix/gtmci_signals.c Examining data/fis-gtm-6.3-007/sr_unix/gtmci_signals.h Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_funclist.h Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_interface.h Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.h Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_sym_ref.c Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_sym_ref.h Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h Examining data/fis-gtm-6.3-007/sr_unix/gtmdbgflags.h Examining data/fis-gtm-6.3-007/sr_unix/gtmgblstat.c Examining data/fis-gtm-6.3-007/sr_unix/gtmgblstat.h Examining data/fis-gtm-6.3-007/sr_unix/gtmio.h Examining data/fis-gtm-6.3-007/sr_unix/gtmio_ch.c Examining data/fis-gtm-6.3-007/sr_unix/gtmlink.c Examining data/fis-gtm-6.3-007/sr_unix/gtmlink.h Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv.c Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv.h Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv_end.c Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv_fetchresync.c Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv_poll_actions.c Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv_shutdown.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsecshr.h Examining data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_cleanup.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsiginfo.h Examining data/fis-gtm-6.3-007/sr_unix/gtmsource.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource.h Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_changelog.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_checkforbacklog.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_checkhealth.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_end.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_flush_fh.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_freeze.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_heartbeat.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_inline.h Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_jnl_release_timer.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_jnlpool.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_losttncomplete.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_mode_change.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_needrestart.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_onln_rlbk_clnup.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_process.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_rootprimary_init.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_seqno_init.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_showbacklog.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_shutdown.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_srv_latch.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_srv_latch.h Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_statslog.c Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_stopfilter.c Examining data/fis-gtm-6.3-007/sr_unix/gtmxc_types.h Examining data/fis-gtm-6.3-007/sr_unix/gv_trig_cmd_table.h Examining data/fis-gtm-6.3-007/sr_unix/gv_trigger.c Examining data/fis-gtm-6.3-007/sr_unix/gv_trigger.h Examining data/fis-gtm-6.3-007/sr_unix/gv_trigger_protos.h Examining data/fis-gtm-6.3-007/sr_unix/gvcmx_canremlk_stub.c Examining data/fis-gtm-6.3-007/sr_unix/gvcmx_reqremlk_stub.c Examining data/fis-gtm-6.3-007/sr_unix/gvcmx_resremlk_stub.c Examining data/fis-gtm-6.3-007/sr_unix/gvcmx_susremlk_stub.c Examining data/fis-gtm-6.3-007/sr_unix/gvcmy_open.h Examining data/fis-gtm-6.3-007/sr_unix/gvcmz_bunch_stub.c Examining data/fis-gtm-6.3-007/sr_unix/gvcmz_error_stub.c Examining data/fis-gtm-6.3-007/sr_unix/gvcmz_neterr_stub.c Examining data/fis-gtm-6.3-007/sr_unix/gvcmz_zflush_stub.c Examining data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_data.c Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_kill.c Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_query.c Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_queryget.c Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c Examining data/fis-gtm-6.3-007/sr_unix/gvusr.c Examining data/fis-gtm-6.3-007/sr_unix/hugetlbfs_overrides.h Examining data/fis-gtm-6.3-007/sr_unix/ident.h Examining data/fis-gtm-6.3-007/sr_unix/incr_link.c Examining data/fis-gtm-6.3-007/sr_unix/incr_link.h Examining data/fis-gtm-6.3-007/sr_unix/init_gtm.c Examining data/fis-gtm-6.3-007/sr_unix/interlock.h Examining data/fis-gtm-6.3-007/sr_unix/invocation_mode.h Examining data/fis-gtm-6.3-007/sr_unix/io_get_fgn_driver.c Examining data/fis-gtm-6.3-007/sr_unix/io_init_name.c Examining data/fis-gtm-6.3-007/sr_unix/io_is_rm.c Examining data/fis-gtm-6.3-007/sr_unix/io_is_sn.c Examining data/fis-gtm-6.3-007/sr_unix/io_open_try.c Examining data/fis-gtm-6.3-007/sr_unix/io_type.c Examining data/fis-gtm-6.3-007/sr_unix/iob.h Examining data/fis-gtm-6.3-007/sr_unix/iob_close.c Examining data/fis-gtm-6.3-007/sr_unix/iob_flush.c Examining data/fis-gtm-6.3-007/sr_unix/iob_open_rd.c Examining data/fis-gtm-6.3-007/sr_unix/iob_open_wt.c Examining data/fis-gtm-6.3-007/sr_unix/iob_read.c Examining data/fis-gtm-6.3-007/sr_unix/iob_write.c Examining data/fis-gtm-6.3-007/sr_unix/ioff_open.c Examining data/fis-gtm-6.3-007/sr_unix/iopi_iocontrol.c Examining data/fis-gtm-6.3-007/sr_unix/iopi_open.c Examining data/fis-gtm-6.3-007/sr_unix/iorm_close.c Examining data/fis-gtm-6.3-007/sr_unix/iorm_flush.c Examining data/fis-gtm-6.3-007/sr_unix/iorm_get.c Examining data/fis-gtm-6.3-007/sr_unix/iorm_open.c Examining data/fis-gtm-6.3-007/sr_unix/iorm_rdone.c Examining data/fis-gtm-6.3-007/sr_unix/iorm_read.c Examining data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c Examining data/fis-gtm-6.3-007/sr_unix/iorm_use.c Examining data/fis-gtm-6.3-007/sr_unix/iorm_write.c Examining data/fis-gtm-6.3-007/sr_unix/iorm_wteol.c Examining data/fis-gtm-6.3-007/sr_unix/iormdef.h Examining data/fis-gtm-6.3-007/sr_unix/iosize.h Examining data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c Examining data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c Examining data/fis-gtm-6.3-007/sr_unix/iosp.h Examining data/fis-gtm-6.3-007/sr_unix/iott_close.c Examining data/fis-gtm-6.3-007/sr_unix/iott_edit.c Examining data/fis-gtm-6.3-007/sr_unix/iott_edit.h Examining data/fis-gtm-6.3-007/sr_unix/iott_flush.c Examining data/fis-gtm-6.3-007/sr_unix/iott_flush_time.h Examining data/fis-gtm-6.3-007/sr_unix/iott_iocontrol.c Examining data/fis-gtm-6.3-007/sr_unix/iott_open.c Examining data/fis-gtm-6.3-007/sr_unix/iott_rdone.c Examining data/fis-gtm-6.3-007/sr_unix/iott_read.c Examining data/fis-gtm-6.3-007/sr_unix/iott_readfl.c Examining data/fis-gtm-6.3-007/sr_unix/iott_use.c Examining data/fis-gtm-6.3-007/sr_unix/iott_write.c Examining data/fis-gtm-6.3-007/sr_unix/iottdef.h Examining data/fis-gtm-6.3-007/sr_unix/iottdefsp.h Examining data/fis-gtm-6.3-007/sr_unix/ious_iocontrol.c Examining data/fis-gtm-6.3-007/sr_unix/ious_open.c Examining data/fis-gtm-6.3-007/sr_unix/ious_rdone.c Examining data/fis-gtm-6.3-007/sr_unix/ious_read.c Examining data/fis-gtm-6.3-007/sr_unix/ious_readfl.c Examining data/fis-gtm-6.3-007/sr_unix/ious_write.c Examining data/fis-gtm-6.3-007/sr_unix/ious_wtone.c Examining data/fis-gtm-6.3-007/sr_unix/ipcrmid.c Examining data/fis-gtm-6.3-007/sr_unix/ipcrmid.h Examining data/fis-gtm-6.3-007/sr_unix/is_file_identical.c Examining data/fis-gtm-6.3-007/sr_unix/is_fstype_nfs.c Examining data/fis-gtm-6.3-007/sr_unix/is_fstype_nfs.h Examining data/fis-gtm-6.3-007/sr_unix/is_proc_alive.c Examining data/fis-gtm-6.3-007/sr_unix/is_raw_dev.c Examining data/fis-gtm-6.3-007/sr_unix/is_raw_dev.h Examining data/fis-gtm-6.3-007/sr_unix/jnl_file_close_timer.c Examining data/fis-gtm-6.3-007/sr_unix/jnl_file_close_timer.h Examining data/fis-gtm-6.3-007/sr_unix/jnl_file_extend.c Examining data/fis-gtm-6.3-007/sr_unix/jnl_file_open.c Examining data/fis-gtm-6.3-007/sr_unix/jnl_fsync.c Examining data/fis-gtm-6.3-007/sr_unix/jnl_output_sp.c Examining data/fis-gtm-6.3-007/sr_unix/jnl_prc_vector.c Examining data/fis-gtm-6.3-007/sr_unix/jnlext_merge_sort_prepare.c Examining data/fis-gtm-6.3-007/sr_unix/jnlext_write.c Examining data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c Examining data/fis-gtm-6.3-007/sr_unix/jnlsp.h Examining data/fis-gtm-6.3-007/sr_unix/jobchild_init.c Examining data/fis-gtm-6.3-007/sr_unix/jobchild_init.h Examining data/fis-gtm-6.3-007/sr_unix/joberr.h Examining data/fis-gtm-6.3-007/sr_unix/jobexam_signal_handler.c Examining data/fis-gtm-6.3-007/sr_unix/jobexam_signal_handler.h Examining data/fis-gtm-6.3-007/sr_unix/jobsp.h Examining data/fis-gtm-6.3-007/sr_unix/laberror.c Examining data/fis-gtm-6.3-007/sr_unix/list_file.c Examining data/fis-gtm-6.3-007/sr_unix/lke.c Examining data/fis-gtm-6.3-007/sr_unix/lke_cmd.c Examining data/fis-gtm-6.3-007/sr_unix/lke_cmd_disallow.c Examining data/fis-gtm-6.3-007/sr_unix/lke_cmd_disallow.h Examining data/fis-gtm-6.3-007/sr_unix/lke_ctrlc_handler.c Examining data/fis-gtm-6.3-007/sr_unix/lke_fileio.c Examining data/fis-gtm-6.3-007/sr_unix/lke_fileio.h Examining data/fis-gtm-6.3-007/sr_unix/lke_getansw.c Examining data/fis-gtm-6.3-007/sr_unix/lke_help.c Examining data/fis-gtm-6.3-007/sr_unix/load.h Examining data/fis-gtm-6.3-007/sr_unix/lockdefs.h Examining data/fis-gtm-6.3-007/sr_unix/lref_parse.c Examining data/fis-gtm-6.3-007/sr_unix/m_zrupdate.c Examining data/fis-gtm-6.3-007/sr_unix/m_ztrigger.c Examining data/fis-gtm-6.3-007/sr_unix/make_cimode.c Examining data/fis-gtm-6.3-007/sr_unix/make_dmode.c Examining data/fis-gtm-6.3-007/sr_unix/make_mode.c Examining data/fis-gtm-6.3-007/sr_unix/make_mode.h Examining data/fis-gtm-6.3-007/sr_unix/map_sym.c Examining data/fis-gtm-6.3-007/sr_unix/maskpass.c Examining data/fis-gtm-6.3-007/sr_unix/mdefsa.h Examining data/fis-gtm-6.3-007/sr_unix/mdefsp.h Examining data/fis-gtm-6.3-007/sr_unix/mem_access.c Examining data/fis-gtm-6.3-007/sr_unix/memprot.c Examining data/fis-gtm-6.3-007/sr_unix/memprot.h Examining data/fis-gtm-6.3-007/sr_unix/mmrhash.c Examining data/fis-gtm-6.3-007/sr_unix/mmrhash.h Examining data/fis-gtm-6.3-007/sr_unix/msg.h Examining data/fis-gtm-6.3-007/sr_unix/mu_all_version_standalone.c Examining data/fis-gtm-6.3-007/sr_unix/mu_all_version_standalone.h Examining data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c Examining data/fis-gtm-6.3-007/sr_unix/mu_cre_structs.c Examining data/fis-gtm-6.3-007/sr_unix/mu_cre_structs.h Examining data/fis-gtm-6.3-007/sr_unix/mu_decrypt.c Examining data/fis-gtm-6.3-007/sr_unix/mu_decrypt.h Examining data/fis-gtm-6.3-007/sr_unix/mu_extract.c Examining data/fis-gtm-6.3-007/sr_unix/mu_getlst.c Examining data/fis-gtm-6.3-007/sr_unix/mu_gvis.c Examining data/fis-gtm-6.3-007/sr_unix/mu_int_ch.c Examining data/fis-gtm-6.3-007/sr_unix/mu_op_open.c Examining data/fis-gtm-6.3-007/sr_unix/mu_op_open.h Examining data/fis-gtm-6.3-007/sr_unix/mu_outofband_setup.c Examining data/fis-gtm-6.3-007/sr_unix/mu_replpool_grab_sem.c Examining data/fis-gtm-6.3-007/sr_unix/mu_replpool_release_sem.c Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.h Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.h Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.c Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.h Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_replpool.c Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_replpool.h Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_rlnkctl.c Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_rlnkctl.h Examining data/fis-gtm-6.3-007/sr_unix/mu_signal_process.c Examining data/fis-gtm-6.3-007/sr_unix/mu_size_arsample.c Examining data/fis-gtm-6.3-007/sr_unix/mu_size_impsample.c Examining data/fis-gtm-6.3-007/sr_unix/mu_size_scan.c Examining data/fis-gtm-6.3-007/sr_unix/mu_swap_root.c Examining data/fis-gtm-6.3-007/sr_unix/mu_term_setup.c Examining data/fis-gtm-6.3-007/sr_unix/mu_term_setup.h Examining data/fis-gtm-6.3-007/sr_unix/mu_trig_trgfile.c Examining data/fis-gtm-6.3-007/sr_unix/mu_trig_trgfile.h Examining data/fis-gtm-6.3-007/sr_unix/mu_truncate.c Examining data/fis-gtm-6.3-007/sr_unix/mu_truncate.h Examining data/fis-gtm-6.3-007/sr_unix/mu_upgrd_sig_init.h Examining data/fis-gtm-6.3-007/sr_unix/mubexpfilnam.c Examining data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c Examining data/fis-gtm-6.3-007/sr_unix/mubgetfil.c Examining data/fis-gtm-6.3-007/sr_unix/mubinccpy.c Examining data/fis-gtm-6.3-007/sr_unix/mucblkini.c Examining data/fis-gtm-6.3-007/sr_unix/mumps_clitab.c Examining data/fis-gtm-6.3-007/sr_unix/mup_bak_sys.c Examining data/fis-gtm-6.3-007/sr_unix/mupip.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_cmd.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_cmd_disallow.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_cmd_disallow.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_crypt.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_crypt.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_ctrl.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_ctrl.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_cvtgbl.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_cvtpgm.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_dump_fhead.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_dump_fhead.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_exit.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_exit_handler.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_ftok.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_ftok.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_hash.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_hash.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_help.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_load_reg_list.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_load_reg_list.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_load_triggerfile.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_quit.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_rctldump.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_rctldump.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_restore.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_rundown.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_set_jnlfile.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_size.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_size.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_trigger.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_trigger.h Examining data/fis-gtm-6.3-007/sr_unix/mupip_upgrade_standalone.c Examining data/fis-gtm-6.3-007/sr_unix/mupip_upgrade_standalone.h Examining data/fis-gtm-6.3-007/sr_unix/muprecsp.h Examining data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c Examining data/fis-gtm-6.3-007/sr_unix/mur_read_file_sp.c Examining data/fis-gtm-6.3-007/sr_unix/murgetlst.c Examining data/fis-gtm-6.3-007/sr_unix/mutex.c Examining data/fis-gtm-6.3-007/sr_unix/mutex_sock_cleanup.c Examining data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c Examining data/fis-gtm-6.3-007/sr_unix/mutex_wake_proc.c Examining data/fis-gtm-6.3-007/sr_unix/mutexsp.h Examining data/fis-gtm-6.3-007/sr_unix/obj_code.c Examining data/fis-gtm-6.3-007/sr_unix/obj_file.c Examining data/fis-gtm-6.3-007/sr_unix/obj_filesp.h Examining data/fis-gtm-6.3-007/sr_unix/obj_fileu.c Examining data/fis-gtm-6.3-007/sr_unix/ojchildioclean.c Examining data/fis-gtm-6.3-007/sr_unix/ojchildioset.c Examining data/fis-gtm-6.3-007/sr_unix/ojchildparms.c Examining data/fis-gtm-6.3-007/sr_unix/ojchkfs.c Examining data/fis-gtm-6.3-007/sr_unix/ojparams.c Examining data/fis-gtm-6.3-007/sr_unix/ojstartchild.c Examining data/fis-gtm-6.3-007/sr_unix/op_currhd.c Examining data/fis-gtm-6.3-007/sr_unix/op_fgnlookup.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnextract.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnextract.h Examining data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c Examining data/fis-gtm-6.3-007/sr_unix/op_fngetdvi.c Examining data/fis-gtm-6.3-007/sr_unix/op_fngetjpi.c Examining data/fis-gtm-6.3-007/sr_unix/op_fngetlki.c Examining data/fis-gtm-6.3-007/sr_unix/op_fngetsyi.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnp1.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnpiece.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnpopulation.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnzcall.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnzconvert.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnzfile.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnzlkid.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnzparse.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnzpid.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnzpriv.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnzsearch.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnzsetprv.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnzsyslog.c Examining data/fis-gtm-6.3-007/sr_unix/op_fnztrnlnm.c Examining data/fis-gtm-6.3-007/sr_unix/op_horolog.c Examining data/fis-gtm-6.3-007/sr_unix/op_job.c Examining data/fis-gtm-6.3-007/sr_unix/op_setextract.c Examining data/fis-gtm-6.3-007/sr_unix/op_setp1.c Examining data/fis-gtm-6.3-007/sr_unix/op_setpiece.c Examining data/fis-gtm-6.3-007/sr_unix/op_zattach.c Examining data/fis-gtm-6.3-007/sr_unix/op_zedit.c Examining data/fis-gtm-6.3-007/sr_unix/op_zhelp_xfr.c Examining data/fis-gtm-6.3-007/sr_unix/op_zhorolog.c Examining data/fis-gtm-6.3-007/sr_unix/op_zlink.c Examining data/fis-gtm-6.3-007/sr_unix/op_zmess.c Examining data/fis-gtm-6.3-007/sr_unix/op_zrupdate.c Examining data/fis-gtm-6.3-007/sr_unix/op_ztrigger.c Examining data/fis-gtm-6.3-007/sr_unix/op_zut.c Examining data/fis-gtm-6.3-007/sr_unix/outc.c Examining data/fis-gtm-6.3-007/sr_unix/parse_file.c Examining data/fis-gtm-6.3-007/sr_unix/parse_file.h Examining data/fis-gtm-6.3-007/sr_unix/pipeint_stats.c Examining data/fis-gtm-6.3-007/sr_unix/pipeint_stats.h Examining data/fis-gtm-6.3-007/sr_unix/probecrit_rec.h Examining data/fis-gtm-6.3-007/sr_unix/process_reorg_encrypt_restart.c Examining data/fis-gtm-6.3-007/sr_unix/process_reorg_encrypt_restart.h Examining data/fis-gtm-6.3-007/sr_unix/put_cdidx.c Examining data/fis-gtm-6.3-007/sr_unix/random.c Examining data/fis-gtm-6.3-007/sr_unix/random.h Examining data/fis-gtm-6.3-007/sr_unix/rc.h Examining data/fis-gtm-6.3-007/sr_unix/rc_cpt.h Examining data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c Examining data/fis-gtm-6.3-007/sr_unix/recover_truncate.c Examining data/fis-gtm-6.3-007/sr_unix/recover_truncate.h Examining data/fis-gtm-6.3-007/sr_unix/recvpool_init.c Examining data/fis-gtm-6.3-007/sr_unix/reg_cmcheck.c Examining data/fis-gtm-6.3-007/sr_unix/rel_crit.c Examining data/fis-gtm-6.3-007/sr_unix/rel_latch.c Examining data/fis-gtm-6.3-007/sr_unix/rel_lock.c Examining data/fis-gtm-6.3-007/sr_unix/rel_quant.c Examining data/fis-gtm-6.3-007/sr_unix/relinkctl.c Examining data/fis-gtm-6.3-007/sr_unix/relinkctl.h Examining data/fis-gtm-6.3-007/sr_unix/remove_rms.c Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.h Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_ftok_counter_halted.c Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_ftok_counter_halted.h Examining data/fis-gtm-6.3-007/sr_unix/repl_instance.c Examining data/fis-gtm-6.3-007/sr_unix/repl_instance.h Examining data/fis-gtm-6.3-007/sr_unix/repl_ipc_cleanup.c Examining data/fis-gtm-6.3-007/sr_unix/repl_log.c Examining data/fis-gtm-6.3-007/sr_unix/repl_log_init.c Examining data/fis-gtm-6.3-007/sr_unix/repl_logfileinfo_get.c Examining data/fis-gtm-6.3-007/sr_unix/repl_msg.h Examining data/fis-gtm-6.3-007/sr_unix/repl_sem.c Examining data/fis-gtm-6.3-007/sr_unix/repl_sem.h Examining data/fis-gtm-6.3-007/sr_unix/repl_sem_sp.h Examining data/fis-gtm-6.3-007/sr_unix/repl_sp.h Examining data/fis-gtm-6.3-007/sr_unix/resetterm.c Examining data/fis-gtm-6.3-007/sr_unix/rmv_mul_slsh.c Examining data/fis-gtm-6.3-007/sr_unix/rmv_mul_slsh.h Examining data/fis-gtm-6.3-007/sr_unix/rtnhdr.h Examining data/fis-gtm-6.3-007/sr_unix/rtnobj.c Examining data/fis-gtm-6.3-007/sr_unix/rtnobj.h Examining data/fis-gtm-6.3-007/sr_unix/rts_error.c Examining data/fis-gtm-6.3-007/sr_unix/same_device_check.c Examining data/fis-gtm-6.3-007/sr_unix/secshr_client.c Examining data/fis-gtm-6.3-007/sr_unix/secshr_client.h Examining data/fis-gtm-6.3-007/sr_unix/semstat2.c Examining data/fis-gtm-6.3-007/sr_unix/send_msg.c Examining data/fis-gtm-6.3-007/sr_unix/set_jnl_file_close.c Examining data/fis-gtm-6.3-007/sr_unix/set_num_additional_processors.c Examining data/fis-gtm-6.3-007/sr_unix/set_zstatus.c Examining data/fis-gtm-6.3-007/sr_unix/setterm.c Examining data/fis-gtm-6.3-007/sr_unix/sgtm_putmsg.c Examining data/fis-gtm-6.3-007/sr_unix/sig_init.c Examining data/fis-gtm-6.3-007/sr_unix/sig_init.h Examining data/fis-gtm-6.3-007/sr_unix/simple_timeout_timer.c Examining data/fis-gtm-6.3-007/sr_unix/sleep.c Examining data/fis-gtm-6.3-007/sr_unix/sleep.h Examining data/fis-gtm-6.3-007/sr_unix/source_file.c Examining data/fis-gtm-6.3-007/sr_unix/ss_anal_shdw_file.c Examining data/fis-gtm-6.3-007/sr_unix/ss_context_mgr.c Examining data/fis-gtm-6.3-007/sr_unix/ss_get_block.c Examining data/fis-gtm-6.3-007/sr_unix/ss_initiate.c Examining data/fis-gtm-6.3-007/sr_unix/ss_lock_facility.c Examining data/fis-gtm-6.3-007/sr_unix/ss_lock_facility.h Examining data/fis-gtm-6.3-007/sr_unix/ss_read_block.c Examining data/fis-gtm-6.3-007/sr_unix/ss_release.c Examining data/fis-gtm-6.3-007/sr_unix/ss_shdw_mgr.c Examining data/fis-gtm-6.3-007/sr_unix/ss_write_block.c Examining data/fis-gtm-6.3-007/sr_unix/std_dev_outbndset.c Examining data/fis-gtm-6.3-007/sr_unix/stop_image.c Examining data/fis-gtm-6.3-007/sr_unix/stop_image_ch.c Examining data/fis-gtm-6.3-007/sr_unix/str_match.c Examining data/fis-gtm-6.3-007/sr_unix/str_match.h Examining data/fis-gtm-6.3-007/sr_unix/suspend.c Examining data/fis-gtm-6.3-007/sr_unix/suspsigs_handler.c Examining data/fis-gtm-6.3-007/sr_unix/suspsigs_handler.h Examining data/fis-gtm-6.3-007/sr_unix/t_recycled2free.c Examining data/fis-gtm-6.3-007/sr_unix/t_recycled2free.h Examining data/fis-gtm-6.3-007/sr_unix/tab_probecrit_rec.h Examining data/fis-gtm-6.3-007/sr_unix/term_setup.c Examining data/fis-gtm-6.3-007/sr_unix/timersp.h Examining data/fis-gtm-6.3-007/sr_unix/trans_log_name.c Examining data/fis-gtm-6.3-007/sr_unix/trigger.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_cmd.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_compare.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_compare_protos.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_delete.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_delete_protos.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_fill_xecute_buffer.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_fill_xecute_buffer.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_incr_cycle.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_incr_cycle.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_locate_andor_load.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_parse.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_parse_protos.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_read_andor_locate.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_scan_string.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_scan_string.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_select.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_select_protos.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_source_read_andor_verify.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_subs_def.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_tpwrap_ch.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_trgfile.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_trgfile_protos.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_update.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_update_protos.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_upgrade_protos.h Examining data/fis-gtm-6.3-007/sr_unix/trigger_user_name.c Examining data/fis-gtm-6.3-007/sr_unix/trigger_user_name.h Examining data/fis-gtm-6.3-007/sr_unix/trmdef.h Examining data/fis-gtm-6.3-007/sr_unix/upd_log_init.c Examining data/fis-gtm-6.3-007/sr_unix/urx_remove.c Examining data/fis-gtm-6.3-007/sr_unix/utfcgr.c Examining data/fis-gtm-6.3-007/sr_unix/utfcgr.h Examining data/fis-gtm-6.3-007/sr_unix/utfcgr_trc.h Examining data/fis-gtm-6.3-007/sr_unix/util_exit_handler.c Examining data/fis-gtm-6.3-007/sr_unix/util_help.c Examining data/fis-gtm-6.3-007/sr_unix/util_help.h Examining data/fis-gtm-6.3-007/sr_unix/util_in_open.c Examining data/fis-gtm-6.3-007/sr_unix/util_input.c Examining data/fis-gtm-6.3-007/sr_unix/util_out_print_gtmio.c Examining data/fis-gtm-6.3-007/sr_unix/util_out_print_vaparm.h Examining data/fis-gtm-6.3-007/sr_unix/util_output.c Examining data/fis-gtm-6.3-007/sr_unix/util_output_cm.c Examining data/fis-gtm-6.3-007/sr_unix/util_spawn.c Examining data/fis-gtm-6.3-007/sr_unix/v15_filestruct.h Examining data/fis-gtm-6.3-007/sr_unix/wait_for_disk_space.c Examining data/fis-gtm-6.3-007/sr_unix/wait_for_disk_space.h Examining data/fis-gtm-6.3-007/sr_unix/warn_db_sz.c Examining data/fis-gtm-6.3-007/sr_unix/warn_db_sz.h Examining data/fis-gtm-6.3-007/sr_unix/wcs_clean_dbsync.c Examining data/fis-gtm-6.3-007/sr_unix/wcs_clean_dbsync.h Examining data/fis-gtm-6.3-007/sr_unix/wcs_clean_dbsync_timer.c Examining data/fis-gtm-6.3-007/sr_unix/wcs_flu.c Examining data/fis-gtm-6.3-007/sr_unix/wcs_get_space.c Examining data/fis-gtm-6.3-007/sr_unix/wcs_write_in_progress_wait.c Examining data/fis-gtm-6.3-007/sr_unix/wcs_write_in_progress_wait.h Examining data/fis-gtm-6.3-007/sr_unix/wcs_wt.h Examining data/fis-gtm-6.3-007/sr_unix/wcs_wt_restart.c Examining data/fis-gtm-6.3-007/sr_unix/wcs_wterror.c Examining data/fis-gtm-6.3-007/sr_unix/wcs_wtfini.c Examining data/fis-gtm-6.3-007/sr_unix/wcs_wtfini_nocrit.c Examining data/fis-gtm-6.3-007/sr_unix/wcs_wtstart.c Examining data/fis-gtm-6.3-007/sr_unix/wcs_wtstart_fini.c Examining data/fis-gtm-6.3-007/sr_unix/zbreaksp.h Examining data/fis-gtm-6.3-007/sr_unix/zcall_package.c Examining data/fis-gtm-6.3-007/sr_unix/zcall_package.h Examining data/fis-gtm-6.3-007/sr_unix/zhist.c Examining data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c Examining data/fis-gtm-6.3-007/sr_unix/zlmov_lnames.c Examining data/fis-gtm-6.3-007/sr_unix/zro_gettok.c Examining data/fis-gtm-6.3-007/sr_unix/zro_load.c Examining data/fis-gtm-6.3-007/sr_unix/zro_search.c Examining data/fis-gtm-6.3-007/sr_unix/zro_shlibs.c Examining data/fis-gtm-6.3-007/sr_unix/zro_shlibs.h Examining data/fis-gtm-6.3-007/sr_unix/zroutinessp.h Examining data/fis-gtm-6.3-007/sr_unix/zshow_devices.c Examining data/fis-gtm-6.3-007/sr_unix/zshow_rctldump.c Examining data/fis-gtm-6.3-007/sr_unix/zshow_zcalls.c Examining data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c Examining data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.h Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm.h Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_bgn_net.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_cn_acpt.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_cn_disc.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_dmpstat.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_end_net.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_exit.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_exit_ch.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_init.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_loop.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_main.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_ping.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_play.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_prsopt.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_rep_err.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_shmclean.c Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_sysenv.h Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_term.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi.h Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_buff_rsp.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_dbms_ch.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_dmp_pkt.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_extstr.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_gvextnam.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_lkextnam.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_def.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_disc.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_get.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_incr.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_kill.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_lock.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_next.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_ordr.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_qry.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_rord.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_set.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_sete.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_setp.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_stat.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_unla.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_unlc.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_unlk.c Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_dbms_ch.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_frmt_lck.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_gbl_ord.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_iscan.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_iscan.h Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_nspace.h Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_oflow.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_clsd.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getp.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getr.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_kill.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_lock.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_logn.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_opnd.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_set.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_setf.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_rundown.c Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_srvc_xct.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_alloc.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_close.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_debug.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_idle.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_init.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_open.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_peer_info.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_read.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_write.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_write_urg.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_async.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_clb_async.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_err.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_exception.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_fini.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_firstone.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getdeferred.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getsockaddr.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_handler.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_housekeeping.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_incoming_call.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_init_clb.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_netinit.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_postevent.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_read.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_select.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_setupfd.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_unit2clb.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_write.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmu_getclb.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmu_ntdroot.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_ch.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_exi_ch.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_clitab.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.h Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_server.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_open_cmerrlog.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_open_cmerrlog.h Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_urgread_ast.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c Examining data/fis-gtm-6.3-007/sr_unix_gnp/gvcmz_errmsg.c Examining data/fis-gtm-6.3-007/sr_unix_nsb/comp_lits.c Examining data/fis-gtm-6.3-007/sr_unix_nsb/obj_code.c Examining data/fis-gtm-6.3-007/sr_unix_nsb/obj_filesp.h Examining data/fis-gtm-6.3-007/sr_unix_nsb/opcode_def.h Examining data/fis-gtm-6.3-007/sr_unix_nsb/rtnhdr.h Examining data/fis-gtm-6.3-007/sr_unix_nsb/shrink_jmps.c Examining data/fis-gtm-6.3-007/sr_x86_64/cmerrors_ctl.c Examining data/fis-gtm-6.3-007/sr_x86_64/cmierrors_ctl.c Examining data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c Examining data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.h Examining data/fis-gtm-6.3-007/sr_x86_64/find_line_call.c Examining data/fis-gtm-6.3-007/sr_x86_64/gdeerrors_ctl.c Examining data/fis-gtm-6.3-007/sr_x86_64/incr_link_sp.h Examining data/fis-gtm-6.3-007/sr_x86_64/make_mode_sp.h Examining data/fis-gtm-6.3-007/sr_x86_64/merrors_ansi.h Examining data/fis-gtm-6.3-007/sr_x86_64/merrors_ctl.c Examining data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c Examining data/fis-gtm-6.3-007/sr_x86_64/ttt.c Examining data/fis-gtm-6.3-007/sr_x86_64/x86_64.h Examining data/fis-gtm-6.3-007/sr_x86_64/zbreaksp.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_mod_16.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_mod_32.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_2b.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g1.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g2.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g3.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g4.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g5.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g6.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g7.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g8.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_reg16.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_reg32.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_reg64.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_reg8.h Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ss.h FINAL RESULTS: data/fis-gtm-6.3-007/sr_port/gtm_stat.h:19:15: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. #define CHMOD chmod data/fis-gtm-6.3-007/sr_port/gtm_unistd.h:20:16: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. #define CHOWN chown data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:197:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char_ptr_t)psa->dbc_gv_cur_region->dyn.addr->fname, (char_ptr_t)dbfn); data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1295:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char_ptr_t)psa->util_cmd_buff, MUPIP_EXTEND); data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1296:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat((char_ptr_t)psa->util_cmd_buff, (char_ptr_t)psa->ofhdr.regname); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:257:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(emsg, (char_ptr_t)psa->tmprsltfile); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:413:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char_ptr_t)psa->util_cmd_buff, RESULT_ASGN); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:414:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat((char_ptr_t)psa->util_cmd_buff, (char_ptr_t)psa->tmprsltfile); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:418:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char_ptr_t)psa->util_cmd_buff, DSE_START_PIPE_RSLT1); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:419:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat((char_ptr_t)psa->util_cmd_buff, (char_ptr_t)psa->tmprsltfile); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:420:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat((char_ptr_t)psa->util_cmd_buff, DSE_START_PIPE_RSLT2); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:164:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char_ptr_t)psa->util_cmd_buff, DSE_START_PIPE_RSLT1); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:165:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat((char_ptr_t)psa->util_cmd_buff, (char_ptr_t)psa->tmprsltfile); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:166:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat((char_ptr_t)psa->util_cmd_buff, DSE_START_PIPE_RSLT2); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:168:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char_ptr_t)psa->util_cmd_buff, DSE_FIND_REG_ALL); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:170:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat((char_ptr_t)psa->util_cmd_buff, (char_ptr_t)psa->regname); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:350:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char_ptr_t)psa->ofhdr.regname, (char_ptr_t)psa->regname); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:352:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char_ptr_t)psa->ofhdr.dbfn, (char_ptr_t)psa->dbc_gv_cur_region->dyn.addr->fname); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:693:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char_ptr_t)intgerrmsg, emsg); data/fis-gtm-6.3-007/sr_port/ext2jnl.c:270:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rec->jrec_tcom.jnl_tid, ptr); data/fis-gtm-6.3-007/sr_port/gdsbt.h:462:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(BLK_INFO_PTR->where, __FILE__); \ data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h:67:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # define SYSTEM system data/fis-gtm-6.3-007/sr_port/gtm_string.h:22:31: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define STRCPY(DEST, SOURCE) strcpy((char *)(DEST), (char *)(SOURCE)) data/fis-gtm-6.3-007/sr_port/gtm_unistd.h:95:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define ACCESS access data/fis-gtm-6.3-007/sr_port/gtm_unistd.h:97:16: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define EXECL execl data/fis-gtm-6.3-007/sr_port/gtm_unistd.h:98:16: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define EXECV execv data/fis-gtm-6.3-007/sr_port/gtmrecv_changelog.c:113:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(recvpool.gtmrecv_local->log_file, gtmrecv_options.log_file); data/fis-gtm-6.3-007/sr_port/gtmrecv_changelog.c:118:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(recvpool.gtmrecv_local->log_file, gtmrecv_options.log_file); data/fis-gtm-6.3-007/sr_port/lv_tree.h:303:35: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define TREE_DEBUG1(p) {printf(p); FFLUSH(stdout);} data/fis-gtm-6.3-007/sr_port/lv_tree.h:304:37: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define TREE_DEBUG2(p, q) {printf(p, q); FFLUSH(stdout);} data/fis-gtm-6.3-007/sr_port/lv_tree.h:305:40: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define TREE_DEBUG3(p, q, r) {printf(p, q, r); FFLUSH(stdout);} data/fis-gtm-6.3-007/sr_port/lv_tree.h:306:43: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define TREE_DEBUG4(p, q, r, s) {printf(p, q, r, s); FFLUSH(stdout);} data/fis-gtm-6.3-007/sr_port/lv_tree.h:307:45: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define TREE_DEBUG5(p, q, r, s, t) {printf(p, q, r, s, t); FFLUSH(stdout);} data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:381:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(db_or_reg, REG_STR); data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:387:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(db_or_reg, FILE_STR); data/fis-gtm-6.3-007/sr_port/repl_filter.c:535:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmd, filter_cmd); data/fis-gtm-6.3-007/sr_port/repl_filter.c:660:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(extract_buff, FILTER_EOT); data/fis-gtm-6.3-007/sr_unix/cli_parse.c:1045:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(val_buf, TAREF1(parm_ary, match_ind)); data/fis-gtm-6.3-007/sr_unix/err_init.c:80:8: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rc = snprintf(procfn, SIZEOF(procfn), COREDUMPFILTERFN, getpid()); data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:123:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("trcstop"); data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:127:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(oldname, trcpath); /* copy path name */ data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:129:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newname, oldname); /* copy 'to' file */ data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:150:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(newname, oldname); data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:151:4: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system(newname); data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:64:18: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define POPEN popen data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:84:21: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define FPRINTF fprintf data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:85:20: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define PRINTF printf data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:86:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. # define SPRINTF sprintf data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:87:22: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define SNPRINTF snprintf data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:101:20: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. # define SCANF scanf data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:102:20: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. # define SSCANF sscanf data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:103:20: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. # define FSCANF fscanf data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:110:8: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. RC = vprintf(FORMAT, VALUE); \ data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:117:8: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. RC = vfprintf(STREAM, FORMAT, VALUE); \ data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:124:8: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. RC = vsprintf(STRING, FORMAT, VALUE); \ data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:131:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. RC = vsnprintf(STRING, SIZE, FORMAT, VALUE); \ data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:140:8: [4] (buffer) vscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. RC = vscanf(FORMAT, POINTER); \ data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:147:8: [4] (buffer) vsscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. RC = vsscanf(STRING, FORMAT, POINTER); \ data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:154:8: [4] (buffer) vfscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. RC = vfscanf(STREAM, FORMAT, POINTER); \ data/fis-gtm-6.3-007/sr_unix/gtm_syslog.h:19:17: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. #define SYSLOG syslog data/fis-gtm-6.3-007/sr_unix/gtm_system.c:101:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(sh, sh, opt, cmdline, NULL); data/fis-gtm-6.3-007/sr_unix/gtm_system.c:103:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(sh, sh, opt, rtn, cmdline, NULL); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:266:31: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define SSL_DPRINT(FP, ...) {fprintf(FP, __VA_ARGS__); fflush(FP);} /* BYPASSOK -- cannot use FFLUSH. */ data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:774:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(env_name_ptr, GTMTLS_PASSWD_ENV_PREFIX); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:788:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pwent->env_name, env_name); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1292:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *)session_id_string, id); /* default to tlsid */ data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:378:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rtnname, rtnname_template); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:458:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curr->key_name, name_search_field_buff); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:460:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curr->key_name, path_array); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:1135:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, left ? "|" : "`"); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:210:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (-1 != (perms = access(pathname, R_OK | X_OK))) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:376:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(env_value, lpasswd); /* Store the hexadecimal representation in environment */ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h:100:8: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rc = snprintf(SRC, LEN, __VA_ARGS__); /* BYPASSOK */ \ data/fis-gtm-6.3-007/sr_unix/gtmsecshr.h:20:22: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. # define DBGGSSHR(x) syslog x data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:112:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(gtmsecshr_sockpath, DEFAULT_GTMSECSHR_SOCK_DIR); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:144:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(gtmsecshr_sockpath + gtmsecshr_sockpath_len , GTMSECSHR_SOCK_PREFIX); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:192:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(gtmsecshr_cli_sock_name.sun_path + gtmsecshr_sockpath_len, (char *)mypid2ascx(pid_str, process_id)); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:342:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(gtm_tmp_val, env_var_ptr); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:421:10: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. ret = execl(REL_PATH_TO_GTMSECSHR, gtm_secshr_orig_path, NULL); data/fis-gtm-6.3-007/sr_unix/iob_open_rd.c:67:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file->path, path); data/fis-gtm-6.3-007/sr_unix/iob_open_wt.c:53:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file->path, path); data/fis-gtm-6.3-007/sr_unix/iott_edit.c:425:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat((char *)string, (char *)str); data/fis-gtm-6.3-007/sr_unix/maskpass.c:44:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(ENV_UNDEF_ERROR "\n", USER_ENV); data/fis-gtm-6.3-007/sr_unix/maskpass.c:49:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(ENV_UNDEF_ERROR "\n", GTM_DIST_ENV); data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:146:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. enum db_acc_method access; data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:310:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *)gv_cur_region->dyn.addr->fname, db_name); data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:170:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *)gv_cur_region->dyn.addr->fname, db_name); data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:119:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. enum db_acc_method access, access_new; data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:489:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ((n_dba != access) && (pvt_csd->acc_meth != access)) /* n_dba is a proxy for no change */ data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:489:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ((n_dba != access) && (pvt_csd->acc_meth != access)) /* n_dba is a proxy for no change */ data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:492:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (dba_mm == access) data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:515:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if(dba_mm != access) data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:523:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pvt_csd->acc_meth = access; data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:530:27: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access_new = (n_dba == access ? pvt_csd->acc_meth : access); data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:530:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access_new = (n_dba == access ? pvt_csd->acc_meth : access); data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:735:26: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access_new = (n_dba == access ? csd->acc_meth : access); data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:735:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access_new = (n_dba == access ? csd->acc_meth : access); data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:839:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (n_dba != access) data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:84:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mutex_sock_path, DEFAULT_MUTEX_SOCK_DIR); data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:97:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mutex_sock_path + mutex_sock_path_len, MUTEX_SOCK_FILE_PREFIX); data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:101:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mutex_sock_path + mutex_sock_path_len, (char *)pid2ascx(pid_str, process_id)); data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:107:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mutex_sock_address.sun_path, mutex_sock_path); data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:166:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mutex_wake_this_proc.sun_path, mutex_sock_path); data/fis-gtm-6.3-007/sr_unix/mutex_wake_proc.c:65:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mutex_wake_this_proc.sun_path + mutex_wake_this_proc_prefix_len, data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:791:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(c2, MUMPS_EXE_STR); data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:800:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cbuff, MUMPS_DIRECT_STR); data/fis-gtm-6.3-007/sr_unix/relinkctl.c:485:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(shm_base->relinkctl_fname, linkctl->relinkctl_path); data/fis-gtm-6.3-007/sr_unix/repl_log.c:45:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fmt_str, time_str); data/fis-gtm-6.3-007/sr_unix/repl_log.c:49:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fmt_str + CTIME_BEFORE_NL + 3, fmt); data/fis-gtm-6.3-007/sr_unix/repl_log_init.c:73:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(log_file_name, log); data/fis-gtm-6.3-007/sr_unix/repl_log_init.c:84:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(log_file_name, NULL_DEVICE); data/fis-gtm-6.3-007/sr_unix/repl_log_init.c:86:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(log, NULL_DEVICE); data/fis-gtm-6.3-007/sr_unix/rtnobj.c:905:14: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. RTNOBJ_DBG(fprintf(stderr, \ data/fis-gtm-6.3-007/sr_unix/rtnobj.c:1029:13: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. RTNOBJ_DBG(fprintf(stderr, \ data/fis-gtm-6.3-007/sr_unix/trigger_update.c:819:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(trig_cmds, cmd_str); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:887:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(trig_options, option_str); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:912:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(trig_cmds, cmd_str); data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:50:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(log_file, recvpool.gtmrecv_local->log_file); data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:58:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file_suffix_str, UPDHELPER_READER_LOG_FILE_SUFFIX); data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:60:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file_suffix_str, UPDHELPER_WRITER_LOG_FILE_SUFFIX); data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:63:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(file_suffix_str, pid_str); data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:66:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(log_file, file_suffix); data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:73:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(recvpool.upd_proc_local->log_file, log_file); data/fis-gtm-6.3-007/sr_unix/zro_shlibs.c:51:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(oshlb->shlib_name, shlib_name); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c:159:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cptr->ag_name, ag_name); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c:224:16: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. pw = (char *) crypt(ag_pass, syspw); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_qry.c:98:12: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(bptr, grp); data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:36:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(newmsg, msg); data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h:20:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. # define GETENV getenv data/fis-gtm-6.3-007/sr_port/wcs_backoff.c:60:3: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(seed); data/fis-gtm-6.3-007/sr_port/wcs_backoff.c:62:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. randfloat = ((double)random()) / RAND_MAX; data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:451:6: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. getenv("gtm_dist"), src, getuid(), geteuid(), getpid(), cmd); data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:124:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. trcpath = getenv("gtm_trace"); data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:323:15: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (NULL == realpath(librarypath, real_path)) data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:381:16: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (NULL == realpath(temp_path, real_path) && (0 != Stat(real_path, &real_path_stat))) data/fis-gtm-6.3-007/sr_unix/gtm_main.c:167:31: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((NULL != (ptr = (char *)getenv(GTM_PASSWD_ENV))) && (0 == strlen(ptr))) data/fis-gtm-6.3-007/sr_unix/gtm_main.c:189:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (NULL != getenv("gtmcrypt_config")) data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:82:14: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. real_dist = realpath(gtm_dist, real_gtm_dist_path); data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:119:15: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. imagepath = realpath(image, image_real_path); data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:142:26: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. int gtm_image_path(char *realpath) data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:145:11: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. SNPRINTF(realpath, GTM_PATH_MAX, PROCSELF, process_id); data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.h:25:26: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. int gtm_image_path(char *realpath); data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:65:20: [3] (tmpfile) tempnam: Temporary file race condition (CWE-377). #define TEMPNAM tempnam data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:530:28: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (NULL == (config_env = getenv("gtmcrypt_config"))) data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:810:31: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. assert((NULL != (env_value = getenv(env_name))) && (0 == STRLEN(env_value))); data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:91:34: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (NULL == (save_libpath_ptr = getenv(LIBPATH_ENV))) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:430:17: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (NULL == realpath(lcl_key_name, path_array)) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:619:29: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (NULL != (config_env = getenv("gtmcrypt_config"))) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:739:15: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (NULL == realpath(key_path, path_array)) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:817:15: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (NULL == realpath(key_path, path_array)) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:150:14: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (NULL == realpath(plugin_dir_path, resolved_plugin_dir_path)) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:165:14: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (NULL == realpath(libpath, resolved_libpath)) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:179:34: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (NULL == (save_libpath_ptr = getenv(LIBPATH_ENV))) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:88:25: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. assert(ret || (NULL != getenv("gtm_white_box_test_case_enable"))); /* || needed for "encryption/key_file_enc" subtest */ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:184:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(ptr = getenv(GNUPGHOME))) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:187:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(ptr = getenv(HOME))) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:172:15: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (NULL == realpath(filename, real_db_path)) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:262:14: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (NULL == realpath(filename, real_db_path)) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:273:15: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (NULL == realpath(filename, real_key_path)) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:235:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (NULL != (ptr = getenv(GTM_OBFUSCATION_KEY))) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:256:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(distptr = getenv(GTM_DIST_ENV))) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:268:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(ptr = getenv(USER_ENV))) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:307:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(lpasswd = getenv(name))) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h:121:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (NULL != (ptr = getenv(GTMCRYPT_FIPS_ENV))) \ data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:360:10: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. chrrv = realpath(realpathbef, realpathaft); /* Normalize dir name - eliminate all symlinks */ data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:383:10: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. chrrv = realpath(path, gtmdist); data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:1031:10: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. csrv = realpath(cmdbuf, rpcmdbuf); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:205:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. env_var_ptr = getenv(GTM_WHITE_BOX_TEST_CASE_ENABLE); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:211:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. env_var_ptr = getenv(GTM_WHITE_BOX_TEST_CASE_NUMBER); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:308:20: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (env_var_ptr = getenv(GTM_DIST)) /* Warning - assignment */ data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:333:20: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (env_var_ptr = getenv(GTM_TMP)) /* Warning - assignment */ data/fis-gtm-6.3-007/sr_unix/gtmsource.c:455:4: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/fis-gtm-6.3-007/sr_unix/maskpass.c:42:33: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (NULL == (env_ptr = (char *)getenv(USER_ENV))) data/fis-gtm-6.3-007/sr_unix/maskpass.c:47:33: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (NULL == (env_ptr = (char *)getenv(GTM_DIST_ENV))) data/fis-gtm-6.3-007/sr_unix/mu_size_arsample.c:219:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. double random, M0, accept[MAX_BT_DEPTH + 1]; data/fis-gtm-6.3-007/sr_unix/mu_size_arsample.c:231:11: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random = drand48(); data/fis-gtm-6.3-007/sr_unix/mu_size_arsample.c:234:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random < accept[j]) data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:248:14: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (NULL == realpath(tempfilename, realpathname)) data/fis-gtm-6.3-007/sr_unix/mupip_size.c:246:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int4 random; data/fis-gtm-6.3-007/sr_unix/mupip_size.c:301:26: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random = (int4)(rCnt * drand48()); data/fis-gtm-6.3-007/sr_unix/mupip_size.c:302:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random = random & 0x7fffffff; /* to make sure that the sign bit(msb) is off */ data/fis-gtm-6.3-007/sr_unix/mupip_size.c:303:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. nBlkId = valBlk[random]; data/fis-gtm-6.3-007/sr_unix/mutex.c:432:38: [3] (random) nrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. timeout.tv_usec = (gtm_tv_usec_t)(nrand48(next_rand) & ((1U << MUTEX_NUM_WAIT_BITS) - 1)) + 1; data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c:21:17: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. double drand48(void); data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c:28:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int4 random; data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c:39:29: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random = (int4)(interval * drand48()); data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c:40:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random = random & 0x7fffffff; /* to make sure that the sign bit(msb) is off*/ data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c:41:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. MV_FORCE_MVAL(ret, random); data/fis-gtm-6.3-007/sr_unix/relinkctl.c:118:12: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. pathptr = realpath(pathin, resolvedpath); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:109:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (gtm_dist=getenv("gtm_dist")) data/fis-gtm-6.3-007/sr_unix_cm/gtcm_shmclean.c:162:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt(argc, argv, "qds")) != -1) data/fis-gtm-6.3-007/sr_i386/auto_zlink.c:71:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rname_local.c, rname.addr, rname.len); data/fis-gtm-6.3-007/sr_i386/emit_code.c:78:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char code_buf[BUFFERED_CODE_SIZE]; data/fis-gtm-6.3-007/sr_i386/incr_link.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char module_name[SIZEOF(mident_fixed)]; data/fis-gtm-6.3-007/sr_i386/incr_link.c:130:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&module_name[0], hdr->routine_name.addr, hdr->routine_name.len); data/fis-gtm-6.3-007/sr_i386/incr_link.c:248:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zlink_mname.c[0], code->routine_name.addr, code->routine_name.len); data/fis-gtm-6.3-007/sr_i386/incr_link.c:307:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rtnid.c[0], sym_temp, sym_size); data/fis-gtm-6.3-007/sr_i386/incr_link.c:333:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&labid.c[0], sym_temp, sym_size); data/fis-gtm-6.3-007/sr_i386/masscomp.h:59:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char name[1]; data/fis-gtm-6.3-007/sr_i386/obj_file.c:55:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char emit_buff[OBJ_EMIT_BUF_SIZE]; /* buffer for emit output */ data/fis-gtm-6.3-007/sr_i386/obj_file.c:75:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rhead->jsb[0], "GTM_CODE", SIZEOF(rhead->jsb)); data/fis-gtm-6.3-007/sr_i386/obj_file.c:222:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, source, size); data/fis-gtm-6.3-007/sr_i386/obj_file.c:229:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(emit_buff + emit_buff_used, source, write); data/fis-gtm-6.3-007/sr_i386/obj_file.c:285:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&newsym->name[0], name->addr, name->len); data/fis-gtm-6.3-007/sr_linux/hugetlbfs_overrides.c:46:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_linux/hugetlbfs_overrides.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char librarypath[GTM_PATH_MAX], *lpath = NULL; data/fis-gtm-6.3-007/sr_linux/hugetlbfs_overrides.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_msg[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_port/add_atom.c:100:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(patmaskptr, strlit_buff, bytelen + PAT_STRLIT_PADDING * SIZEOF(uint4)); data/fis-gtm-6.3-007/sr_port/advancewindow.c:36:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char ctypetab[NUM_CHARS]; data/fis-gtm-6.3-007/sr_port/advancewindow.c:56:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *error, errtxt[(3 + 1) UTF8_ONLY(* GTM_MB_LEN_MAX)], x; /* up to 3 digits/byte & a comma */ data/fis-gtm-6.3-007/sr_port/advancewindow.c:219:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, (TREF(director_mval)).str.addr, (TREF(director_mval)).str.len); data/fis-gtm-6.3-007/sr_port/advancewindow.c:323:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ident_buffer[(MAX_MIDENT_LEN * 2) + 1]; data/fis-gtm-6.3-007/sr_port/advancewindow.c:331:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ident_buffer, (TREF(window_ident)).addr, (TREF(window_ident)).len); data/fis-gtm-6.3-007/sr_port/advancewindow.c:348:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(director_ident)).addr, ident_buffer, (TREF(director_ident)).len); data/fis-gtm-6.3-007/sr_port/alloc_reg.c:51:65: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATICFNDCL void remove_backptr(triple *curtrip, oprtype *opnd, char (*tempcont)[MAX_TEMP_COUNT]); data/fis-gtm-6.3-007/sr_port/alloc_reg.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempcont[VALUED_REF_TYPES][MAX_TEMP_COUNT], dest_type; data/fis-gtm-6.3-007/sr_port/alloc_reg.c:233:53: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void remove_backptr(triple *curtrip, oprtype *opnd, char (*tempcont)[MAX_TEMP_COUNT]) data/fis-gtm-6.3-007/sr_port/anticipatory_freeze.h:491:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */ data/fis-gtm-6.3-007/sr_port/backup_block.c:123:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((sblkh_p + 1), bkp_src_blk, bsiz); data/fis-gtm-6.3-007/sr_port/backup_block.c:126:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((sblkh_p + 1), bkp_src_blk, bsiz); data/fis-gtm-6.3-007/sr_port/bit_clear.c:15:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char bit_clear_mask[8] = {127, 191, 223, 239, 247, 251, 253, 254}; data/fis-gtm-6.3-007/sr_port/bm_setmap.c:100:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cse->new_buff, bmp, ((blk_hdr_ptr_t)bmp)->bsiz); data/fis-gtm-6.3-007/sr_port/buddy_list.c:244:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, *ptrArrayCurr, copysize); data/fis-gtm-6.3-007/sr_port/bx_boollit.c:158:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (void)matchc(v[1]->str.len, (unsigned char *)v[1]->str.addr, v[0]->str.len, data/fis-gtm-6.3-007/sr_port/bx_boollit.c:159:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (unsigned char *)v[0]->str.addr, &dummy, &tvr); data/fis-gtm-6.3-007/sr_port/cache_put.c:45:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csp->obj.addr, object->addr, object->len); data/fis-gtm-6.3-007/sr_port/ccp.h:106:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char txt[23]; data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:61:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF char *indents[11] = data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mid[(SIZEOF(mident_fixed) * 2) + 1]; /* Sized to hold an labels name rtn.lbl */ data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:219:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mid, opr->oprval.lab->mvname.addr, len); data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:231:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mid, opr->oprval.cdlt->addr, len); data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:242:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mid, opr->oprval.cdidx->addr, len); data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:334:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, strp, len); data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:345:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (char *)indents[indent]; data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:364:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*buf, str, len); data/fis-gtm-6.3-007/sr_port/ceprep_file.c:58:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char charspace, ceprep_name_buff[MAX_MIDENT_LEN + SIZEOF(".MCI") - 1], fname[255]; data/fis-gtm-6.3-007/sr_port/ceprep_file.c:73:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ceprep_name_buff, module_name.addr, mname_len); data/fis-gtm-6.3-007/sr_port/cert_blk.c:124:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ch, prior_expkey[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/cert_blk.c:131:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/cert_blk.c:139:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char key_buffer[MAX_ZWR_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/cert_blk.c:432:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prior_expkey + rec_cmpc, key_base, key_size); data/fis-gtm-6.3-007/sr_port/cert_blk.c:458:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_gvkey->base, prior_expkey, prior_expkeylen); data/fis-gtm-6.3-007/sr_port/cli_port.c:289:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char two_num_qual_str[128]; data/fis-gtm-6.3-007/sr_port/cmd.c:135:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF unsigned char cmd_index[27] = data/fis-gtm-6.3-007/sr_port/cmmdef.h:108:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[3]; data/fis-gtm-6.3-007/sr_port/cmmdef.h:200:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char node[32]; data/fis-gtm-6.3-007/sr_port/cmmdef.h:206:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[3]; data/fis-gtm-6.3-007/sr_port/cmmdef.h:209:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lockname[256]; data/fis-gtm-6.3-007/sr_port/cmmdef.h:226:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char node[32]; data/fis-gtm-6.3-007/sr_port/cmmdef.h:232:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/fis-gtm-6.3-007/sr_port/cmmdef.h:247:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[S_PROTSIZE]; data/fis-gtm-6.3-007/sr_port/cmmdef.h:353:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, (PTR), (LEN) - 6); \ data/fis-gtm-6.3-007/sr_port/collseq.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char transbuf[MAX_TRANS_NAME_LEN]; data/fis-gtm-6.3-007/sr_port/collseq.c:39:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char filespec[SIZEOF(CT_PREFIX) + 4]; /* '4' to hold the chars in the max allowable data/fis-gtm-6.3-007/sr_port/collseq.c:58:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(filespec, CT_PREFIX, SIZEOF(CT_PREFIX)); data/fis-gtm-6.3-007/sr_port/common_startup_init.c:35:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_port/common_startup_init.c:56:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtm_dist, dist, len); data/fis-gtm-6.3-007/sr_port/comp_init.c:45:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(source_buffer)).addr,src->addr,src->len); data/fis-gtm-6.3-007/sr_port/compile_pattern.c:77:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, &retstr.buff[0], retmval.str.len); data/fis-gtm-6.3-007/sr_port/compiler.h:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[20]; data/fis-gtm-6.3-007/sr_port/compiler.h:408:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TREF(side_effect_base), TMP_BASE, SIZEOF(boolean_t) * TREF(expr_depth)); \ data/fis-gtm-6.3-007/sr_port/compiler.h:572:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ident_buffer[(MAX_MIDENT_LEN * 2) + 1]; data/fis-gtm-6.3-007/sr_port/compiler.h:582:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(SAVE_PARSE_PTR->ident_buffer, (TREF(director_ident)).addr, SAVE_PARSE_PTR->director_ident_len); \ data/fis-gtm-6.3-007/sr_port/compiler.h:596:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(director_ident)).addr, SAVE_PARSE_PTR->ident_buffer, SAVE_PARSE_PTR->director_ident_len); \ data/fis-gtm-6.3-007/sr_port/compiler_startup.c:69:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char err_buf[45]; data/fis-gtm-6.3-007/sr_port/compiler_startup.c:168:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sl->str.addr, (TREF(source_buffer)).addr, n + 1); data/fis-gtm-6.3-007/sr_port/compiler_startup.c:232:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, " error", SIZEOF(" error")); data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c:104:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *org_fn, rename_fn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c:135:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(info->prev_jnl, rename_fn, rename_fn_len + 1); data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c:160:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hdr_base[JNL_HDR_LEN + MAX_IO_BLOCK_SIZE]; data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c:165:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *create_fn, fn_buff[MAX_FN_LEN + STR_LIT_LEN(EXT_NEW) + 1]; data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c:315:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char*)&pini_record->process_vector[CURR_JPV], (unsigned char*)prc_vec, SIZEOF(jnl_process_vector)); data/fis-gtm-6.3-007/sr_port/cre_jnl_file_intrpt_rename.c:45:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ext_new_jnl_fn[MAX_FN_LEN + STR_LIT_LEN(EXT_NEW) + 1]; data/fis-gtm-6.3-007/sr_port/cre_private_code_copy.c:52:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_ptext, rtn->ptext_adr, code_size); data/fis-gtm-6.3-007/sr_port/create_fatal_error_zshow_dmp.c:33:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dump_fn[GTM_PATH_MAX], *dump_fn_ptr; data/fis-gtm-6.3-007/sr_port/cryptdef.h:17:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char gtm_serial[8]; data/fis-gtm-6.3-007/sr_port/cryptdef.h:23:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char key[SIZEOF(gtm_id_block)]; data/fis-gtm-6.3-007/sr_port/cvtparm.c:123:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, cp, siz); data/fis-gtm-6.3-007/sr_port/db_common_init.c:44:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reg->jnl_file_name, csd->jnl_file_name, reg->jnl_file_len); /* journal file name */ data/fis-gtm-6.3-007/sr_port/dbcertify.c:67:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_port/dbcertify.h:101:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char p1hdr_tag[8]; /* We are what we are */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:109:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char regname[V4_MAX_RN_LEN + 1]; /* Region name for DSE */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:110:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dbfn[V4_MAX_FN_LEN + 1]; /* Database file name */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fillx[32 - SIZEOF(unique_file_id)]; /* Fill out for variable size of unique_id */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fill512[152]; /* Pad out to 512 for VMS oddities with fixed record IO and hdr rewrite */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:136:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char base[1]; /* Base of the key */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:224:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char util_cmd_buff[256]; /* Buffer for DSE and/or MUPIP command creation */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:241:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char outfn[MAX_FN_LEN + 1]; /* File name argument (may be db or outfile depending on phase) */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:242:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char regname[MAX_RN_LEN + 1]; /* Buffer for region name */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:243:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rslt_buff[MAX_ZWR_KEY_SZ + 1]; /* Buffer for reading from result file */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:244:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tmpcmdfile[MAX_FN_LEN + 1]; /* Temporary command file name */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:245:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tmprsltfile[MAX_FN_LEN + 1]; /* Temporary command result file name */ data/fis-gtm-6.3-007/sr_port/dbcertify.h:246:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tmpfiledir[MAX_FN_LEN + 1]; /* Directory where temp files created (defaults to current dir */ data/fis-gtm-6.3-007/sr_port/dbcertify_base_ch.c:57:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msginfo[4]; data/fis-gtm-6.3-007/sr_port/dbcertify_base_ch.c:58:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msg_buff[MAX_MSG_SIZE + 1]; data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ans[2]; data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:118:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dbfn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:247:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)&psa->rhdr, (char *)&psa->gvtroot_rchildren[psa->gvtroot_rchildren_cnt], data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:741:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_set_p->prev_blk_key, blk_set_p->curr_blk_key, (SIZEOF(dbc_gv_key) + blk_set_p->curr_blk_key->end)); data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:870:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, blk_set_p->ins_rec.ins_key->base + blk_set_p->prev_match, data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1036:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_set_prnt_p->ins_rec.ins_key, last_rec_key, data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1073:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, blk_set_p->curr_blk_key->base, curr_rec_cmpc); data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1175:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_set_prnt_p->ins_rec.ins_key, blk_set_p->prev_blk_key, data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1297:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat((char_ptr_t)psa->util_cmd_buff, " "OPTDELIM"B="); data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1421:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_blk_p, blk_sega_p->addr, blk_sega_p->len); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtm_dist_path_buff[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:116:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psa->util_cmd_buff + SIZEOF(SETDISTLOGENV) - 1, gtm_dist_path.addr, gtm_dist_path.len); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:163:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char cmdbuf1[MAX_FN_LEN + 256], cmdbuf2[MAX_FN_LEN + 1], *cp; data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:169:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, psa->tmpcmdfile, psa->tmpcmdfile_len); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:182:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, psa->tmprsltfile, psa->tmprsltfile_len); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:238:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char emsg[MAX_FN_LEN + 256]; data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:256:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(emsg, "Temporary results file ("); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:258:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(emsg, " had unexpected values"); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:329:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, psa->tmpfiledir, len); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:345:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, regname_p, len); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:356:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, psa->tmpcmdfile, dir_len); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:363:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, regname_p, len); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:453:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dbfn, rptr, len); data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:544:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_set_new_p->old_buff, data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:677:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psa->gvn_key, key, SIZEOF(dbc_gv_key) + key->gvn_len); /* Make key with GVN only (including trailing null) */ data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:779:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_set_p->prev_blk_key, blk_set_p->curr_blk_key, data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:952:30: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (psa->dbc_gv_cur_region->open) data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:116:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dbfn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:187:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(badfn, dbfn, len); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:188:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(badfn + len, DEFAULT_OUTFILE_SUFFIX, SIZEOF(DEFAULT_OUTFILE_SUFFIX)); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:247:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psa->ofhdr.p1hdr_tag, P1HDR_TAG, SIZEOF(psa->ofhdr.p1hdr_tag)); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:348:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&psa->ofhdr.unique_id, &FILE_INFO(psa->dbc_gv_cur_region)->fileid, SIZEOF(unique_file_id)); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:664:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char intgerrmsg[256]; data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:694:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat((char_ptr_t)intgerrmsg, " in block 0x"); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:766:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_target->clue.base, psa->first_rec_key->base, psa->first_rec_key->end + 1); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:801:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_altkey->base, psa->first_rec_key->base, psa->first_rec_key->gvn_len + 1); data/fis-gtm-6.3-007/sr_port/ddphdr.h:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro*/ \ data/fis-gtm-6.3-007/sr_port/ddphdr.h:148:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char txt[1]; data/fis-gtm-6.3-007/sr_port/ddphdr.h:156:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char destination_address[ETHERADDR_LENGTH]; data/fis-gtm-6.3-007/sr_port/ddphdr.h:157:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char source_address[ETHERADDR_LENGTH]; data/fis-gtm-6.3-007/sr_port/ddphdr.h:158:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char protocol_type[2]; data/fis-gtm-6.3-007/sr_port/ddphdr.h:170:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char code[DDP_ANNOUNCE_CODE_LEN]; /* position 17: "WI", or "II" */ data/fis-gtm-6.3-007/sr_port/ddphdr.h:171:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ether_addr[ETHERADDR_LENGTH]; /* position 19: Ethernet physical address for this node */ data/fis-gtm-6.3-007/sr_port/ddphdr.h:187:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char filler3[32 + 4 + 8]; /* position 75: at position 107 we write literal 0x01ff00ff */ data/fis-gtm-6.3-007/sr_port/ddphdr.h:201:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char global[1]; /* actually, global_len bytes of formatted global reference */ data/fis-gtm-6.3-007/sr_port/desired_db_format_set.c:70:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_port/deviceparameters.c:315:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parstr[MAXDEVPARLEN]; data/fis-gtm-6.3-007/sr_port/deviceparameters.c:617:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(parptr, tmpmval.str.addr, tmpmval.str.len); data/fis-gtm-6.3-007/sr_port/do_indir_do.c:44:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ident.c, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_port/do_patsplit.c:80:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&min[0], patptr, SIZEOF(*patptr) * count); data/fis-gtm-6.3-007/sr_port/do_patsplit.c:82:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&max[0], patptr, SIZEOF(*patptr) * count); data/fis-gtm-6.3-007/sr_port/do_patsplit.c:84:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&size[0], patptr, SIZEOF(*patptr) * count); data/fis-gtm-6.3-007/sr_port/do_patsplit.c:187:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(patptr, patptr_start, (char *)fixed_patptr - (char *)patptr_start); data/fis-gtm-6.3-007/sr_port/do_patsplit.c:210:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(patptr, fixed_patptr, (char *)right_patptr - (char *)fixed_patptr); data/fis-gtm-6.3-007/sr_port/do_patsplit.c:228:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(patptr, right_patptr, (char *)patptr_end - (char *)right_patptr); data/fis-gtm-6.3-007/sr_port/do_pattern.c:70:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *stridx[MAX_PATTERN_ATOMS]; data/fis-gtm-6.3-007/sr_port/do_pattern.c:146:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(repeat, min, count * SIZEOF(*min)); data/fis-gtm-6.3-007/sr_port/dollar_quit.c:165:12: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. ZOS_ONLY(memcpy(&instr_RR, sf->mpc, SIZEOF(instr_RR))); data/fis-gtm-6.3-007/sr_port/dollar_quit.c:170:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&instr_LG, ptrs.instr, SIZEOF(instr_LG)); data/fis-gtm-6.3-007/sr_port/dollar_quit.c:196:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&instr_LDX, ptrs.instr, SIZEOF(instr_LDX)); data/fis-gtm-6.3-007/sr_port/dollar_system_init.c:31:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_TRANS_NAME_LEN]; data/fis-gtm-6.3-007/sr_port/dollar_system_init.c:39:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, "47,", dollar_system.str.len); data/fis-gtm-6.3-007/sr_port/dollar_system_init.c:46:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, tn.addr, tn.len); data/fis-gtm-6.3-007/sr_port/dollar_system_init.c:51:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, svec->sysid_ptr->addr, svec->sysid_ptr->len); data/fis-gtm-6.3-007/sr_port/dpgbldir.c:44:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char gde_labels[GDE_LABEL_NUM][GDE_LABEL_SIZE]; data/fis-gtm-6.3-007/sr_port/dpgbldir.c:94:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name->name.addr, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_port/dpgbldir.c:183:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char regname[MAX_MIDENT_LEN + 1]; data/fis-gtm-6.3-007/sr_port/dse.h:42:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dollarh_buffer, dollarh_mval.str.addr, dollarh_mval.str.len); \ data/fis-gtm-6.3-007/sr_port/dse.h:49:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zdate_buffer, zdate_mval.str.addr, zdate_mval.str.len); \ data/fis-gtm-6.3-007/sr_port/dse.h:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char confirm[256]; \ data/fis-gtm-6.3-007/sr_port/dse.h:185:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_bp, bp, SIZEOF(blk_hdr)); \ data/fis-gtm-6.3-007/sr_port/dse.h:197:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_bp, bp, bp->bsiz); \ data/fis-gtm-6.3-007/sr_port/dse.h:229:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char patch_comp_key[MAX_KEY_SZ + 1]; \ data/fis-gtm-6.3-007/sr_port/dse_adrec.c:42:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char patch_comp_key[MAX_KEY_SZ + 1], *update_array, *update_array_ptr; data/fis-gtm-6.3-007/sr_port/dse_adrec.c:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[MAX_LINE], key[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/dse_adrec.c:91:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lbp, blkhist.buffaddr, blk_size); data/fis-gtm-6.3-007/sr_port/dse_adrec.c:199:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size); data/fis-gtm-6.3-007/sr_port/dse_adrec.c:219:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rp, new_bp, new_len); data/fis-gtm-6.3-007/sr_port/dse_adstar.c:81:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lbp, blkhist.buffaddr, blk_size); data/fis-gtm-6.3-007/sr_port/dse_all.c:134:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:57:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mask, util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:100:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(util_buff, "Block ", 6); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:103:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " Size ", 8); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:106:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " Level !UL TN ", 18); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:109:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " ", 1); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:113:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], gtm_dbversion_table[ondsk_blkver], len); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:115:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], "!/", 2); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:145:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "Block ", 6); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:148:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " Size ", 8); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:151:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " Master Status: Cannot Determine (bplmap == 0)!/", 50); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:161:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "Block ", 6); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:164:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " Size ", 7); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:167:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " Level !SB TN ", 16); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:170:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " ", 1); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:174:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], gtm_dbversion_table[ondsk_blkver], len); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:179:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " Master Status: !AD!/",23); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:190:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(util_buff, "Block ", 6); data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:194:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ":!_| ", 6); data/fis-gtm-6.3-007/sr_port/dse_cache.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dollarh_buffer[MAXNUMLEN], zdate_buffer[SIZEOF(DSE_DMP_TIME_FMT)]; data/fis-gtm-6.3-007/sr_port/dse_cache.c:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_str[OUT_LINE], temp_str1[OUT_LINE]; data/fis-gtm-6.3-007/sr_port/dse_cache.c:98:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open || reg->was_open) data/fis-gtm-6.3-007/sr_port/dse_chng_fhead.c:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_str[OUT_LINE], temp_str1[OUT_LINE], buf[MAX_LINE], *fname_ptr; data/fis-gtm-6.3-007/sr_port/dse_chng_fhead.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash_buff[GTMCRYPT_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/dse_chng_fhead.c:674:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cs_data->encryption_hash, hash_buff, GTMCRYPT_HASH_LEN); data/fis-gtm-6.3-007/sr_port/dse_crit.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_crit.c:149:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "!/Critical section crash count is ", 34); data/fis-gtm-6.3-007/sr_port/dse_crit.c:152:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], "!/", 2); data/fis-gtm-6.3-007/sr_port/dse_crit.c:165:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!r_local->open || r_local->was_open) data/fis-gtm-6.3-007/sr_port/dse_data.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE],*src,*bot,*top; data/fis-gtm-6.3-007/sr_port/dse_dmp_fhead.c:59:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char *jrt_label[JRT_RECTYPES]; data/fis-gtm-6.3-007/sr_port/dse_dmp_fhead.c:90:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char util_buff[MAX_UTIL_LEN], buffer[MAXNUMLEN]; data/fis-gtm-6.3-007/sr_port/dse_dmp_fhead.c:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dollarh_buffer[MAXNUMLEN], zdate_buffer[SIZEOF(DSE_DMP_TIME_FMT)], fullblockwrite_buffer[255], *k; data/fis-gtm-6.3-007/sr_port/dse_dmp_fhead.c:106:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char outbuf[GTMCRYPT_HASH_HEX_LEN + 1]; data/fis-gtm-6.3-007/sr_port/dse_eval.c:31:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_eval.c:41:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "Hex: ", 6); data/fis-gtm-6.3-007/sr_port/dse_eval.c:44:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len]," Dec: !@UQ", 13); data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:138:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:141:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ":", 1); data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:155:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:158:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ":", 1); data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:164:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char targ_key[MAX_KEY_SZ + 1], util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:154:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:158:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ":", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:162:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ",", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:175:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:179:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ":", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:183:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ",", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:188:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:428:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:431:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ":", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:434:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ",", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:449:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:452:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ":", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:455:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ",", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:462:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:466:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], "!/", 2); data/fis-gtm-6.3-007/sr_port/dse_f_free.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_f_free.c:78:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(util_buff, "Error: bit map in block ", 24); data/fis-gtm-6.3-007/sr_port/dse_f_free.c:81:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " incorrectly marked free in master map.", 39); data/fis-gtm-6.3-007/sr_port/dse_f_free.c:88:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "!/Next free block is ", 21); data/fis-gtm-6.3-007/sr_port/dse_f_free.c:91:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ".!/", 3); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char targ_key[MAX_KEY_SZ + 1], targ_key_root[MAX_KEY_SZ + 1], *key_top, util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_f_key.c:88:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targ_key_root[0], &targ_key[0], size_root); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:111:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(util_buff, "!/Key not found, would be in block ", 36); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:114:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ".", 1); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:120:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(util_buff, "!/Key found in block ", 22); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:123:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ".", 1); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:130:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:133:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ":", 1); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:136:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ", ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:144:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:147:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ":", 1); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:150:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ", ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:157:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(util_buff, " ", 1); data/fis-gtm-6.3-007/sr_port/dse_f_key.c:160:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], "!/", 2); data/fis-gtm-6.3-007/sr_port/dse_f_reg.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rn[MAX_RN_LEN]; data/fis-gtm-6.3-007/sr_port/dse_f_reg.c:88:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!statsDBreg->open) data/fis-gtm-6.3-007/sr_port/dse_f_reg.c:111:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!regptr->open) data/fis-gtm-6.3-007/sr_port/dse_fdmp.c:49:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char patch_comp_key[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/dse_find_gvt.c:39:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_port/dse_getki.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_ZWR_KEY_SZ], *src, *temp_dst, *bot, *top, *tmp, slit[MAX_KEY_SZ + 1], key_buf[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/dse_getki.c:201:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, &gv_currkey->base[0], *len); data/fis-gtm-6.3-007/sr_port/dse_getki.c:208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lcl_buf[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/dse_integ.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_integ.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_buff[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/dse_integ.c:54:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "!/Checking integrity of block ", 30); data/fis-gtm-6.3-007/sr_port/dse_integ.c:57:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], ":", 1); data/fis-gtm-6.3-007/sr_port/dse_is_blk_in.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char targ_key[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/dse_is_blk_in.c:36:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(targ_key, rp + SIZEOF(rec_hdr), size); data/fis-gtm-6.3-007/sr_port/dse_is_blk_in.c:53:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(targ_key, rp + SIZEOF(rec_hdr), size); data/fis-gtm-6.3-007/sr_port/dse_ksrch.c:33:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char patch_comp_key[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/dse_ksrch.c:93:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size); data/fis-gtm-6.3-007/sr_port/dse_m_rest.c:59:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_m_rest.c:110:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(util_buff,"Invalid pointer in block ",25); data/fis-gtm-6.3-007/sr_port/dse_m_rest.c:113:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " record offset ",15); data/fis-gtm-6.3-007/sr_port/dse_maps.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_maps.c:211:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " is marked !AD in its local bit map.!/", data/fis-gtm-6.3-007/sr_port/dse_order.c:33:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char patch_comp_key[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/dse_order.c:104:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size); data/fis-gtm-6.3-007/sr_port/dse_over.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chset_name[MAX_CHSET_NAME + 1]; data/fis-gtm-6.3-007/sr_port/dse_over.c:186:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, stringpool.free, cvt_len); data/fis-gtm-6.3-007/sr_port/dse_over.c:197:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (lbp, blkhist.buffaddr, blk_size); data/fis-gtm-6.3-007/sr_port/dse_over.c:198:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lbp + offset, &data[0], data_len); data/fis-gtm-6.3-007/sr_port/dse_range.c:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char level, lower[MAX_KEY_SZ + 1], targ_key[MAX_KEY_SZ + 1], upper[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/dse_rest.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char util_buff[MAX_UTIL_LEN], rn[MAX_RN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/dse_rest.c:112:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!region->open) data/fis-gtm-6.3-007/sr_port/dse_rest.c:154:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "!/Restoring block ", 18); data/fis-gtm-6.3-007/sr_port/dse_rest.c:157:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&util_buff[util_len], " from version !UL", 17); data/fis-gtm-6.3-007/sr_port/dse_rest.c:164:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, " of block ", 10); data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:43:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char patch_comp_key[MAX_KEY_SZ + 1], *update_array, *update_array_ptr; data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comp_key[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:85:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lbp, blkhist.buffaddr, blk_size); data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:107:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&comp_key[0], &patch_comp_key[0], SIZEOF(patch_comp_key)); data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:160:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size); data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:173:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rp_base + SIZEOF(rec_hdr), &patch_comp_key[i], patch_comp_count - i); data/fis-gtm-6.3-007/sr_port/dse_rmsb.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_rmsb.c:88:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "!/Removing version !UL of block ", util_len); data/fis-gtm-6.3-007/sr_port/dse_save.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_COMMENT_LEN], *ptr, util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dse_save.c:58:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "!/Saved versions of block ", util_len); data/fis-gtm-6.3-007/sr_port/dse_save.c:82:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "Block ", util_len); data/fis-gtm-6.3-007/sr_port/dse_save.c:115:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "!/Saving version !UL of block ", util_len); data/fis-gtm-6.3-007/sr_port/dse_save.c:131:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(patch_save_set[patch_save_count].bp, bp, cs_addrs->hdr->blk_size); data/fis-gtm-6.3-007/sr_port/dse_save.c:140:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(patch_save_set[patch_save_count].comment, &buff[0], j); data/fis-gtm-6.3-007/sr_port/dump_record.c:45:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char patch_comp_key[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/dump_record.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_buf[MAX_KEY_SZ + 1], *temp_ptr, *temp_key, util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/dump_record.c:119:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size); data/fis-gtm-6.3-007/sr_port/dumptable.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outbuf[256]; data/fis-gtm-6.3-007/sr_port/dumptable.c:41:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c,argtype[i],5); data/fis-gtm-6.3-007/sr_port/dumptable.c:47:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(c, &start8[0], SIZEOF(start8) - 1); data/fis-gtm-6.3-007/sr_port/dumptable.c:51:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(c, &start9[0], SIZEOF(start9) - 1); data/fis-gtm-6.3-007/sr_port/ebc_xlat.c:31:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF unsigned char e2a[256] = data/fis-gtm-6.3-007/sr_port/ebc_xlat.c:71:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF unsigned char a2e[256] = data/fis-gtm-6.3-007/sr_port/ecode_add.c:31:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dollar_ecode.end, str, strlen); \ data/fis-gtm-6.3-007/sr_port/ecode_add.c:61:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dollar_stack.end, mvalptr->str.addr, mvalptr->str.len); data/fis-gtm-6.3-007/sr_port/ecode_add.c:111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eclostmid_buf[MAX_DIGITS_IN_INT + STR_LIT_LEN(",Z,")], *dest; data/fis-gtm-6.3-007/sr_port/ecode_set.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ecode_buff[ECODE_MAX_LEN_WITH_BUFFER]; data/fis-gtm-6.3-007/sr_port/emit_code.c:57:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char vdat_bdisp[VDAT_BDISP_SIZE + 1] = "B^"; data/fis-gtm-6.3-007/sr_port/emit_code.c:58:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char vdat_wdisp[VDAT_WDISP_SIZE + 1] = "W^"; data/fis-gtm-6.3-007/sr_port/emit_code.c:59:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char vdat_r9[VDAT_R9_SIZE + 1] = "(r9)"; data/fis-gtm-6.3-007/sr_port/emit_code.c:60:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char vdat_r8[VDAT_R8_SIZE + 1] = "(r8)"; data/fis-gtm-6.3-007/sr_port/emit_code.c:61:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char vdat_gr[VDAT_GR_SIZE + 1] = "G^"; data/fis-gtm-6.3-007/sr_port/emit_code.c:62:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char vdat_immed[VDAT_IMMED_SIZE + 1] = "I^#"; data/fis-gtm-6.3-007/sr_port/emit_code.c:63:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char vdat_r11[VDAT_R11_SIZE + 1] = "(R11)"; data/fis-gtm-6.3-007/sr_port/emit_code.c:64:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char vdat_gtmliteral[VDAT_GTMLITERAL_SIZE + 1] = "GTM$LITERAL"; data/fis-gtm-6.3-007/sr_port/emit_code.c:65:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char vdat_def[VDAT_DEF_SIZE + 1] = "@"; data/fis-gtm-6.3-007/sr_port/emit_code.c:69:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF unsigned char outbuf[ASM_OUT_BUFF]; /* assembly language output buffer */ data/fis-gtm-6.3-007/sr_port/emit_code.c:116:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char value[PUSH_LIST_SIZE]; data/fis-gtm-6.3-007/sr_port/emit_code.c:382:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vxi_opcode[instr][0], 6); data/fis-gtm-6.3-007/sr_port/emit_code.c:1247:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_def[0], VDAT_DEF_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1249:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_gtmliteral[0], VDAT_GTMLITERAL_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1269:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_gr[0], VDAT_GR_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1272:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, ct->operand[0].oprval.cdlt->addr, data/fis-gtm-6.3-007/sr_port/emit_code.c:1293:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_immed[0], VDAT_IMMED_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1302:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_immed[0], VDAT_IMMED_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1328:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_bdisp[0], VDAT_BDISP_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1332:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_wdisp[0], VDAT_WDISP_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1336:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_r9[0], VDAT_R9_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1360:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_def[0], VDAT_DEF_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1365:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_bdisp[0], VDAT_BDISP_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1369:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_wdisp[0], VDAT_WDISP_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1375:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_r8[0], VDAT_R8_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1379:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_r9[0], VDAT_R9_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1804:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_def[0], VDAT_DEF_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1808:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_bdisp[0], VDAT_BDISP_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1812:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_wdisp[0], VDAT_WDISP_SIZE); data/fis-gtm-6.3-007/sr_port/emit_code.c:1816:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (c = (unsigned char *)xfer_name[offset]; *c ; ) data/fis-gtm-6.3-007/sr_port/emit_code.c:1818:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obpt, &vdat_r11[0], VDAT_R11_SIZE); data/fis-gtm-6.3-007/sr_port/entryref.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rtn_text[SIZEOF(mident_fixed)], lab_text[SIZEOF(mident_fixed)]; data/fis-gtm-6.3-007/sr_port/entryref.c:100:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(labname.addr, (TREF(window_ident)).addr, (TREF(window_ident)).len); data/fis-gtm-6.3-007/sr_port/eval_expr.c:118:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_mval.str.addr, m1->v.str.addr, m1->v.str.len); data/fis-gtm-6.3-007/sr_port/eval_expr.c:119:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_mval.str.addr + m1->v.str.len, m2->v.str.addr, m2->v.str.len); data/fis-gtm-6.3-007/sr_port/expritem.c:132:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF unsigned char svn_index[27] = { data/fis-gtm-6.3-007/sr_port/expritem.c:307:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF unsigned char fun_index[27] = data/fis-gtm-6.3-007/sr_port/expritem.c:657:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)stringpool.free, v.str.addr, v.str.len); data/fis-gtm-6.3-007/sr_port/ext2jnl.c:97:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, origbuf, tmpsize); data/fis-gtm-6.3-007/sr_port/ext2jnl.c:301:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rec->jrec_set_kill.mumps_node.text, gv_currkey->base, gv_currkey->end); data/fis-gtm-6.3-007/sr_port/fgn_glopref.c:33:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free,v->str.addr,v->str.len); data/fis-gtm-6.3-007/sr_port/fileinfo.h:23:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char usr[FI_USR_SZ]; /* user name */ data/fis-gtm-6.3-007/sr_port/fileinfo.h:24:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trm[FI_TRM_SZ]; /* terminal identification */ data/fis-gtm-6.3-007/sr_port/fileinfo.h:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[2]; /* used for longword alignment */ data/fis-gtm-6.3-007/sr_port/fnpc.h:56:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char unibytes_val[4]; data/fis-gtm-6.3-007/sr_port/format2zwr.c:128:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&des[dstlen], cp, chlen); data/fis-gtm-6.3-007/sr_port/format2zwr.c:179:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&des[dstlen], cp, chlen); data/fis-gtm-6.3-007/sr_port/format2zwr.c:232:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&des[dstlen], cp, chlen); data/fis-gtm-6.3-007/sr_port/format_key_lv_val.c:77:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, tempmv.str.addr, size); data/fis-gtm-6.3-007/sr_port/format_key_lv_val.c:81:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, tempmv.str.addr, tempmv.str.len); data/fis-gtm-6.3-007/sr_port/format_key_mvals.c:56:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, (keys)->str.addr, (keys)->str.len); data/fis-gtm-6.3-007/sr_port/format_key_mvals.c:63:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, (keys)->str.addr, size); data/fis-gtm-6.3-007/sr_port/format_lvname.c:60:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, vent->addr, len); data/fis-gtm-6.3-007/sr_port/format_targ_key.c:27:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ch, *gvkey_char_ptr, *out_top, *work_char_ptr, work_buff[MAX_ZWR_KEY_SZ], *work_top; data/fis-gtm-6.3-007/sr_port/gbldefs.c:274:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF unsigned char t_fail_hist[CDB_MAX_TRIES]; /* type has to be unsigned char and not enum cdb_sc to ensure single byte */ data/fis-gtm-6.3-007/sr_port/gbldefs.c:346:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char muext_code[MUEXT_MAX_TYPES][2] = data/fis-gtm-6.3-007/sr_port/gbldefs.c:397:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char cli_err_str[MAX_CLI_ERR_STR] = ""; /* Parse Error message buffer */ data/fis-gtm-6.3-007/sr_port/gbldefs.c:615:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF char *jrt_label[JRT_RECTYPES] = data/fis-gtm-6.3-007/sr_port/gbldefs.c:639:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF char *jnl_file_state_lit[JNL_FILE_STATES] = data/fis-gtm-6.3-007/sr_port/gbldefs.c:742:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char routine_name_buff[SIZEOF(mident_fixed)], module_name_buff[SIZEOF(mident_fixed)]; data/fis-gtm-6.3-007/sr_port/gbldefs.c:743:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char int_module_name_buff[SIZEOF(mident_fixed)]; data/fis-gtm-6.3-007/sr_port/gbldefs.c:747:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char rev_time_buf[REV_TIME_BUFF_LEN]; data/fis-gtm-6.3-007/sr_port/gbldefs.c:750:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF unsigned char source_file_name[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/gbldefs.c:751:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF unsigned char object_file_name[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/gbldefs.c:926:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char dl_err[MAX_ERRSTR_LEN]; data/fis-gtm-6.3-007/sr_port/gbldefs.c:1066:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char repl_instfilename[MAX_FN_LEN + 1]; /* save first instance */ data/fis-gtm-6.3-007/sr_port/gbldefs.c:1067:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char repl_inst_name[MAX_INSTNAME_LEN]; /* for syslog */ data/fis-gtm-6.3-007/sr_port/gbldefs.c:1075:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char gtm_dist[GTM_PATH_MAX]; /* Value of $gtm_dist env variable */ data/fis-gtm-6.3-007/sr_port/gbldefs.c:1183:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char io_setup_errstr[IO_SETUP_ERRSTR_ARRAYSIZE]; data/fis-gtm-6.3-007/sr_port/gds_blk_downgrade.c:80:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trg_p, src_p, movesize); data/fis-gtm-6.3-007/sr_port/gds_map_moved.c:89:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(baseDBreg->open); data/fis-gtm-6.3-007/sr_port/gds_map_moved.c:90:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (baseDBreg->open) /* be safe in pro even though we have an assert above */ data/fis-gtm-6.3-007/sr_port/gdsblkops.h:247:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lcl_ptr, (ADDR), lcl_len); \ data/fis-gtm-6.3-007/sr_port/gdsbt.h:82:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_8byte[8]; /* previously header_open_tn but no longer used. data/fis-gtm-6.3-007/sr_port/gdsbt.h:103:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[3]; data/fis-gtm-6.3-007/sr_port/gdsbt.h:122:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[3]; data/fis-gtm-6.3-007/sr_port/gdsbt.h:272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lock_op[OP_LOCK_SIZE]; /* Operation performed (either OBTN or RLSE) */ data/fis-gtm-6.3-007/sr_port/gdsbt.h:318:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pre_block[32]; data/fis-gtm-6.3-007/sr_port/gdsbt.h:319:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char post_block[32]; data/fis-gtm-6.3-007/sr_port/gdsbt.h:326:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash[GTMCRYPT_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/gdsbt.h:327:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash2[GTMCRYPT_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/gdsbt.h:346:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash[GTMCRYPT_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/gdsbt.h:347:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash2[GTMCRYPT_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/gdsbt.h:348:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char region[100]; data/fis-gtm-6.3-007/sr_port/gdsbt.h:349:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char where[100]; data/fis-gtm-6.3-007/sr_port/gdsbt.h:460:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(BLK_INFO_PTR->hash, (CSD)->encryption_hash, GTMCRYPT_HASH_LEN); \ data/fis-gtm-6.3-007/sr_port/gdsbt.h:461:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(BLK_INFO_PTR->hash2, (CSD)->encryption_hash2, GTMCRYPT_HASH_LEN); \ data/fis-gtm-6.3-007/sr_port/gdsbt.h:465:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(BLK_INFO_PTR->region, (char *)(CSA)->region->dyn.addr->fname, \ data/fis-gtm-6.3-007/sr_port/gdsbt.h:469:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(BLK_INFO_PTR->region, "UNKNOWN"); \ data/fis-gtm-6.3-007/sr_port/gdsbt.h:480:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_info_ptr->info.block_update.pre_block, PRE_BLK, 32); \ data/fis-gtm-6.3-007/sr_port/gdsbt.h:481:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_info_ptr->info.block_update.post_block, POST_BLK, 32); \ data/fis-gtm-6.3-007/sr_port/gdsbt.h:517:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_info_ptr->info.trans_update.hash, TRANS_INFO->encryption_hash, GTMCRYPT_HASH_LEN); \ data/fis-gtm-6.3-007/sr_port/gdsbt.h:518:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_info_ptr->info.trans_update.hash2, TRANS_INFO->encryption_hash2, GTMCRYPT_HASH_LEN); \ data/fis-gtm-6.3-007/sr_port/gdsbt.h:534:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char label[GDS_LABEL_SZ]; /* 12 signature for GDS shared memory */ data/fis-gtm-6.3-007/sr_port/gdsbt.h:535:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char fname[MAX_FN_LEN + 1]; /* 256 filename of corresponding database */ data/fis-gtm-6.3-007/sr_port/gdsbt.h:536:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char now_running[MAX_REL_NAME]; /* 36 current active GT.M version stamp */ data/fis-gtm-6.3-007/sr_port/gdsbt.h:537:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char machine_name[MAX_MCNAMELEN]; /* 256 machine name for clustering */ data/fis-gtm-6.3-007/sr_port/gdsbt.h:623:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char replinstfilename[MAX_FN_LEN + 1];/* 256 : Name of the replication instance file corresponding to this db */ data/fis-gtm-6.3-007/sr_port/gdsbt.h:624:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statsdb_fname[MAX_FN_LEN + 1]; /* Is empty-string if IS_RDBF_STATSDB(csd) is FALSE. data/fis-gtm-6.3-007/sr_port/gdsbt.h:717:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(statsDBreg->dyn.addr->fname, statsDBfname, fnameLen + 1); /* copy trailing '\0' too */ \ data/fis-gtm-6.3-007/sr_port/gdsbt.h:730:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(statsDBcsd->basedb_fname, baseDBreg->dyn.addr->fname, fname_len + 1); /* copy trailing '\0' too */ \ data/fis-gtm-6.3-007/sr_port/gdscc.h:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_contents[DBKEYSIZE(MAX_KEY_SZ)]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:341:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_KEY, old_KEY, SIZEOF(gv_key) - 1 + old_KEY->end); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:564:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!baseDBreg->open) \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:566:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!statsDBreg->open) \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:599:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(baseDBreg->open); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:600:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(statsDBreg->open); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:638:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(!REG->open); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:702:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!REG->open && IS_REG_BG_OR_MM(REG)) \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:954:55: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == gv_cur_region || FALSE == gv_cur_region->open) \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:992:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1277:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char instfilename_copy[MAX_FN_LEN + 1]; \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1320:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&instfilename_copy[0], jnlpool_instfilename, SIZEOF(instfilename_copy)); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1897:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char label[GDS_LABEL_SZ]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1935:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_created[52]; /* Now unused .. was "file_info created" */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1952:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_256[8]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1954:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char now_running[MAX_REL_NAME];/* for active version stamp */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1961:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_320[4]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1994:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_384[12]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1997:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_trans_hist[8]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2027:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_unixonly[40]; /* to ensure this section has 64-byte multiple size */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2040:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_accounting_64_align[4]; /* to ensure this section has 64-byte multiple size */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2055:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_ccp_rc[8]; /* to ensure this section has 64-byte multiple size */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2067:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_repl[16]; /* to ensure this section has 64-byte multiple size */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2088:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_jnl[8]; /* to ensure this section has 64-byte multiple size */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2100:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_1k[24]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2102:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char jnl_file_name[JNL_NAME_SIZE]; /* journal file name */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2103:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char reorg_restart_key[OLD_MAX_KEY_SZ + 1]; /* 1st key of a leaf block where reorg was done last time. data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char machine_name[MAX_MCNAMELEN]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encryption_hash[GTMCRYPT_RESERVED_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encryption_hash2[GTMCRYPT_RESERVED_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_encrypt[80]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bg_trc_rec_tn_filler [1200 - (SIZEOF(bg_trc_rec_tn) * n_bg_trc_rec_types)]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bg_trc_rec_cntr_filler[600 - (SIZEOF(bg_trc_rec_cntr) * n_bg_trc_rec_types)]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2140:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char db_csh_acct_rec_filler_4k[248 - (SIZEOF(db_csh_acct_rec) * n_db_csh_acct_rec_types)]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gvstats_rec_filler_4k_plus_512[512 - SIZEOF(gvstats_rec_t)]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2145:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_4k_plus_512[368]; /* Note: this filler array should START at offset 4K+512. So any additions data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2184:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char basedb_fname[256]; /* full path filaneme of corresponding baseDB if this is a statsDB */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_7k[440]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2187:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_8k[1024]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encryption_hash[GTMCRYPT_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2315:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encryption_hash2[GTMCRYPT_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2329:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((DST)->encryption_hash, (SRC)->encryption_hash, GTMCRYPT_HASH_LEN); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2330:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((DST)->encryption_hash2, (SRC)->encryption_hash2, GTMCRYPT_HASH_LEN); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2424:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[12]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2440:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char instfilename[MAX_FN_LEN + 1]; /* + 1 for null */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2467:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[2]; /* filler to store runtime structures without changing gdeget/gdeput.m */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2469:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[6]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2478:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sname[MAX_SN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2480:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char fname[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2485:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char defext[4]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2501:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[12]; /* filler to store runtime structures without changing gdeget/gdeput.m */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2513:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rname[MAX_RN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2518:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bool open; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2546:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char jnl_file_name[JNL_NAME_SIZE]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2564:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[39]; /* filler to store runtime structures without changing gdeget/gdeput.m */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2749:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char gblname[MAX_NM_LEN + 1]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2870:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char base[1]; /* Base of the key */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2926:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char last_split_direction[MAX_BT_DEPTH - 1]; /* maintain last split direction for each level in the GVT */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2927:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_8byte_align1[6]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3225:32: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). || ((FALSE == gv_cur_region->open) && (dba_bg == REG_ACC_METH(gv_cur_region)))); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3378:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *endBuff, fmtBuff[MAX_ZWR_KEY_SZ]; \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3396:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3423:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((gv_currkey->base + gv_currkey->end), mvarg->str.addr, len); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3492:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(GVT->clue.base, GVKEY->base, keyend - 1); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3499:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(GVT->clue.base, GVKEY->base, keyend + 1); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3510:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TARG_KEY), (SRC_KEY), OFFSETOF(gv_key, base[0]) + (SRC_KEY)->end + 1); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3519:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(((sm_uc_ptr_t)(TARG_KEY) + 2), ((sm_uc_ptr_t)(SRC_KEY) + 2), OFFSETOF(gv_key, base[0]) + (SRC_KEY)->end - 1); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3753:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char label[GDS_LABEL_SZ]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3755:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char now_running[MAX_REL_NAME]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3757:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char instfilename[MAX_FN_LEN + 1]; /* Identify which instance file this shared pool corresponds to */ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4417:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4428:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char t_fail_hist_dbg[T_FAIL_HIST_DBG_SIZE]; data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4444:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, gvent->var_name.addr, gvent->var_name.len); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4548:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; /* for LAST_RESTART_CODE */ \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4746:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!REG->open) \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4840:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. DEBUG_ONLY(GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES];) \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5048:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&SAVE_KEY[0], gv_currkey, SIZEOF(gv_key) + gv_currkey->end); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5053:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey, &SAVE_KEY[0], SIZEOF(gv_key) + SAVE_KEY[0].end); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5059:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&SAVE_KEY[0], gv_altkey, SIZEOF(gv_key) + gv_altkey->end); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5064:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_altkey, &SAVE_KEY[0], SIZEOF(gv_key) + SAVE_KEY[0].end); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5072:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&SAVE_KEY[0], &gv_currkey->base[PREV], OLDEND - PREV + 1); \ data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5079:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_currkey->base[PREV], &SAVE_KEY[0], OLDEND - PREV + 1); \ data/fis-gtm-6.3-007/sr_port/gdsroot.h:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dvi[16]; data/fis-gtm-6.3-007/sr_port/gdsroot.h:111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_id[UNIQUE_ID_SIZE]; data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c:24:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(QUALIF->FIELD.str.addr, glb_cmd_qlf.FIELD.str.addr, glb_cmd_qlf.FIELD.str.len); \ data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c:40:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char inbuf[255]; data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c:61:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s->addr, glb_cmd_qlf.object_file.str.addr, data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c:112:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s->addr, glb_cmd_qlf.list_file.str.addr, data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c:153:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s->addr, glb_cmd_qlf.ceprep_file.str.addr, s->len); data/fis-gtm-6.3-007/sr_port/get_dlr_key.c:21:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[128], *cp, *cend; data/fis-gtm-6.3-007/sr_port/get_dlr_zkey.c:22:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[128], *cp, *cend; data/fis-gtm-6.3-007/sr_port/get_frame_place_mcode.c:39:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pos_str[MAX_ENTRYREF_LEN]; data/fis-gtm-6.3-007/sr_port/get_log_name.c:31:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[LOGNAME_LEN]; data/fis-gtm-6.3-007/sr_port/get_log_name.c:60:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new->dollar_io, buf, v_len); data/fis-gtm-6.3-007/sr_port/get_symb_line.c:73:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, gtmImageNames[image_type].imageName, gtmImageNames[image_type].imageNameLen); data/fis-gtm-6.3-007/sr_port/getjobname.c:29:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char djbuff[10]; /* storage for dollar job's string form */ data/fis-gtm-6.3-007/sr_port/getjobname.c:37:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(djbuff,dollar_job.str.addr,dollar_job.str.len); data/fis-gtm-6.3-007/sr_port/getzdir.c:34:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dollar_zdir.str.addr, cwd.str.addr, cwd.str.len); data/fis-gtm-6.3-007/sr_port/glvn_pool.c:63:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pool, old_pool, slotoff + old_pool->top * SIZEOF(glvn_pool_entry)); data/fis-gtm-6.3-007/sr_port/glvn_pool.c:85:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mval_stack, old_mval_stack, pool->mval_top * SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:104:38: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define MEMCPY_LIT(TARGET, LITERAL) memcpy(TARGET, LITERAL, SIZEOF(LITERAL) - 1) data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:133:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mcs_ptr, SRC, mcs_len); \ data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:144:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mcs_ptr, SRC, mcs_len); \ data/fis-gtm-6.3-007/sr_port/gtm_env_init.c:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_TRANS_NAME_LEN]; data/fis-gtm-6.3-007/sr_port/gtm_env_init.c:176:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(mprof_env_gbl_name)).str.addr, trans.addr, trans.len); data/fis-gtm-6.3-007/sr_port/gtm_env_init.c:194:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(gbuff_limit)).str.addr, trans.addr, trans.len); data/fis-gtm-6.3-007/sr_port/gtm_env_init.c:316:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(gtmprompt)).addr, trans.addr, trans.len); data/fis-gtm-6.3-007/sr_port/gtm_env_xlate_init.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_port/gtm_env_xlate_init.c:52:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(env_gtm_env_xlate.addr, buf, tn.len); data/fis-gtm-6.3-007/sr_port/gtm_fcntl.h:20:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define OPEN open data/fis-gtm-6.3-007/sr_port/gtm_fcntl.h:21:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define OPEN3 open data/fis-gtm-6.3-007/sr_port/gtm_malloc.h:35:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GTM64_ONLY(char filler[4];) /* Explicit filler to align the length - may be repurposed */ data/fis-gtm-6.3-007/sr_port/gtm_malloc.h:43:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char headMarker[GTM64_ONLY(8)NON_GTM64_ONLY(4)]; /* Header that should not be modified during usage */ data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:339:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nullHMark[4]; data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:340:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nullStr[1]; data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:341:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nullTMark[4]; data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:363:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATICD readonly unsigned char markerChar[8] = {0xde, 0xad, 0xbe, 0xef, 0xef, 0xbe, 0xad, 0xde}; data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:365:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATICD readonly unsigned char markerChar[4] = {0xde, 0xad, 0xbe, 0xef}; data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:383:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATICD readonly unsigned char backfillMarkC[8] = {0xde, 0xad, 0xbe, 0xef, 0xde, 0xad, 0xbe, 0xef}; data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:385:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATICD readonly unsigned char backfillMarkC[4] = {0xde, 0xad, 0xbe, 0xef}; data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:572:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uStor2->headMarker, markerChar, SIZEOF(uStor2->headMarker)); /* Put header tag in place */ data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:615:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uStor2->headMarker, markerChar, SIZEOF(uStor2->headMarker)); data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:755:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uStor->headMarker, markerChar, SIZEOF(uStor->headMarker)); data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:757:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trailerMarker, markerChar, SIZEOF(markerChar)); /* Small trailer */ data/fis-gtm-6.3-007/sr_port/gtm_maxstr.c:66:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(maxstr_buff[maxstr_stack_level].addr, *buff, space_occupied); data/fis-gtm-6.3-007/sr_port/gtm_maxstr.c:71:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(maxstr_buff[maxstr_stack_level].addr, *buff, space_occupied); data/fis-gtm-6.3-007/sr_port/gtm_maxstr.h:76:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define MAXSTR_BUFF_DECL(var) char var[MAX_STRBUFF_INIT]; data/fis-gtm-6.3-007/sr_port/gtm_memcpy_validate_and_execute.c:41:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return memcpy(target, src, len); data/fis-gtm-6.3-007/sr_port/gtm_repl.h:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[MAX_TLSID_LEN]; data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h:25:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). #define ATOI atoi data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h:26:15: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). #define ATOL atol data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h:63:16: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). mkstemp_res = mkstemp(template); \ data/fis-gtm-6.3-007/sr_port/gtm_string.h:39:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # ifdef memcpy data/fis-gtm-6.3-007/sr_port/gtm_string.h:40:12: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # undef memcpy /* Some platforms like AIX create memcpy as a #define which needs removing before re-define */ data/fis-gtm-6.3-007/sr_port/gtm_string.h:42:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(TARGET, SRC, LEN) gtm_memcpy_validate_and_execute((void *)(TARGET), (const void *)(SRC), (LEN)) data/fis-gtm-6.3-007/sr_port/gtm_string.h:64:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(DST, STR, local_len); \ data/fis-gtm-6.3-007/sr_port/gtm_tempnam.c:36:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fullname, SCRATCH_DIR, len); data/fis-gtm-6.3-007/sr_port/gtm_tempnam.c:40:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fullname, dir, len); data/fis-gtm-6.3-007/sr_port/gtm_tempnam.c:49:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, prefix, len); data/fis-gtm-6.3-007/sr_port/gtmrecv_comm_init.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_port/gtmrecv_get_opt.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statslog_val[4]; /* "ON" or "OFF" */ data/fis-gtm-6.3-007/sr_port/gtmrecv_helpers_init.c:64:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_port/gtmrecv_helpers_init.c:79:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char helper_cmd[UPDHELPER_CMD_MAXLEN]; data/fis-gtm-6.3-007/sr_port/gtmrecv_start_helpers.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_str[BUFSIZ]; data/fis-gtm-6.3-007/sr_port/gtmrecv_upd_proc_init.c:62:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_port/gtmrecv_upd_proc_init.c:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char upd_proc_cmd[UPDPROC_CMD_MAXLEN]; data/fis-gtm-6.3-007/sr_port/gtmsource_ch.c:77:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg_local->open && !reg_local->was_open) data/fis-gtm-6.3-007/sr_port/gtmsource_comm_init.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_string[1024]; data/fis-gtm-6.3-007/sr_port/gtmsource_comm_init.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_port/gtmsource_comm_init.c:108:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((struct sockaddr*)(>msource_local->secondary_inet_addr), ai_ptr->ai_addr, ai_ptr->ai_addrlen); data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c:125:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_ctl->jnl_fn, jnl_fn, jnl_fn_len); data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c:192:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lcl_jnl_fn[JNL_NAME_SIZE]; data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c:268:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_ctl->jnl_fn, csd->jnl_file_name, tmp_ctl->jnl_fn_len); data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c:314:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lcl_jnl_fn, tmp_ctl->jnl_fn, lcl_jnl_fn_len); data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c:397:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_port/gtmsource_poll_actions.c:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 1]; data/fis-gtm-6.3-007/sr_port/gtmsource_poll_actions.c:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char print_msg[REPL_MSG_SIZE], msg_str[OUT_LINE]; data/fis-gtm-6.3-007/sr_port/gtmsource_poll_actions.c:133:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(time_str, time_ptr, CTIME_BEFORE_NL); data/fis-gtm-6.3-007/sr_port/gv_bind_name.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format_key[MAX_MIDENT_LEN + 1]; /* max key length + 1 byte for '^' */ data/fis-gtm-6.3-007/sr_port/gv_bind_name.c:71:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/gv_bind_name.c:108:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/gv_bind_name.c:119:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&format_key[1], gvname->var_name.addr, gvname->var_name.len); data/fis-gtm-6.3-007/sr_port/gv_bind_name.c:129:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, gvname->var_name.addr, keylen); data/fis-gtm-6.3-007/sr_port/gv_init_reg.c:52:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/gv_init_reg.c:58:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_port/gv_match.c:36:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!gv_region->open) data/fis-gtm-6.3-007/sr_port/gv_rundown.c:93:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (r_local->open && (dba_cm != r_local->dyn.addr->acc_meth)) data/fis-gtm-6.3-007/sr_port/gv_select.c:216:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gmap_ptr, gmap_ptr_base, SIZEOF(mstr) * gmap_size); data/fis-gtm-6.3-007/sr_port/gv_xform_key.c:54:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TREF(gv_sparekey), keyp, SIZEOF(gv_key) + keyp->end); data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.c:136:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[OUT_LINE], crbuff[SIZEOF(blk_hdr_ptr_t) + 1], regbuff[MAX_RN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.c:153:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(regbuff, gv_cur_region->rname, gv_cur_region->rname_len); data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.h:150:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_altkey->base, prevKey->base, prevKey->end - 1); data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.h:249:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prevKeyStart + prevKeyCmpLen, prevKeyUnCmp, nTmp - prevKeyCmpLen); data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.h:365:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prevKeyStart, prevKeyUnCmp, prevKeyUnCmpLen); data/fis-gtm-6.3-007/sr_port/gvcst_bmp_mark_free.c:68:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/gvcst_dataget.c:235:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, (sm_uc_ptr_t)rp + rsiz - data_len, data_len); data/fis-gtm-6.3-007/sr_port/gvcst_dataget.c:240:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sn_ptr, (sm_uc_ptr_t)rp + rsiz - data_len, data_len); data/fis-gtm-6.3-007/sr_port/gvcst_delete_blk.c:99:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cse, old_cse, SIZEOF(cw_set_element)); data/fis-gtm-6.3-007/sr_port/gvcst_delete_blk.c:112:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cse->new_buff, old_cse->new_buff, ((blk_hdr_ptr_t)old_cse->new_buff)->bsiz); data/fis-gtm-6.3-007/sr_port/gvcst_expand_any_key.c:68:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char expanded_star_key[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/gvcst_expand_any_key.c:147:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(expanded_key, expanded_star_key, star_keylen + star_keycmpc); data/fis-gtm-6.3-007/sr_port/gvcst_expand_free_subtree.c:67:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char temp_buff[MAX_DB_BLK_SIZE]; data/fis-gtm-6.3-007/sr_port/gvcst_expand_free_subtree.c:138:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(temp_buff, bp, bsiz); data/fis-gtm-6.3-007/sr_port/gvcst_expand_key.c:83:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(expKeyStart + expKeyCmpLen, expKeyUnCmp, nTmp - expKeyCmpLen); data/fis-gtm-6.3-007/sr_port/gvcst_expand_key.c:125:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpPtr, expKeyUnCmp, expKeyUnCmpLen); data/fis-gtm-6.3-007/sr_port/gvcst_expand_key.h:121:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dstEnd, src, match); data/fis-gtm-6.3-007/sr_port/gvcst_get.c:220:49: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, (sm_uc_ptr_t)rp + rsiz - data_len, data_len); data/fis-gtm-6.3-007/sr_port/gvcst_get.c:222:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sn_ptr, (sm_uc_ptr_t)rp + rsiz - data_len, data_len); data/fis-gtm-6.3-007/sr_port/gvcst_init.c:349:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trans_buff[MAX_FN_LEN + 1], statsdb_path[MAX_FN_LEN + 1], *errrsn_text; data/fis-gtm-6.3-007/sr_port/gvcst_init.c:380:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(!reg->open); data/fis-gtm-6.3-007/sr_port/gvcst_init.c:385:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!baseDBreg->open) data/fis-gtm-6.3-007/sr_port/gvcst_init.c:389:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(baseDBreg->open); data/fis-gtm-6.3-007/sr_port/gvcst_init.c:390:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open) /* statsDB was opened as part of opening baseDB. No need to do anything more here */ data/fis-gtm-6.3-007/sr_port/gvcst_init.c:564:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(statsdb_path, reg->dyn.addr->fname, reg->dyn.addr->fname_len); data/fis-gtm-6.3-007/sr_port/gvcst_init.c:774:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(!statsDBreg->open); data/fis-gtm-6.3-007/sr_port/gvcst_init.c:873:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reg->dyn.addr->fname, prev_reg->dyn.addr->fname, prev_reg->dyn.addr->fname_len); data/fis-gtm-6.3-007/sr_port/gvcst_init.c:886:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reg->jnl_file_name, csd->jnl_file_name, reg->jnl_file_len); /* journal file name */ data/fis-gtm-6.3-007/sr_port/gvcst_init.c:1072:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_port/gvcst_init.c:1211:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(gbuff_limit)).str.addr, REORG_GBUFF_LIMIT, SIZEOF(REORG_GBUFF_LIMIT)); data/fis-gtm-6.3-007/sr_port/gvcst_kill.c:107:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/gvcst_kill.c:480:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_altkey, gv_currkey, SIZEOF(gv_key) + end); data/fis-gtm-6.3-007/sr_port/gvcst_kill_blk.c:313:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(skb, &search_key->base[targ_base], targ_len); data/fis-gtm-6.3-007/sr_port/gvcst_order.c:201:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c1, gv_currkey->base, bh->curr_rec.match); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:115:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/gvcst_put.c:238:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dbg_valbuff, val->str.addr, MIN(ARRAYSIZE(dbg_valbuff), dbg_vallen)); \ data/fis-gtm-6.3-007/sr_port/gvcst_put.c:279:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mychars[MAX_NSBCTRL_SZ]; data/fis-gtm-6.3-007/sr_port/gvcst_put.c:453:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *va, last_split_direction[MAX_BT_DEPTH]; data/fis-gtm-6.3-007/sr_port/gvcst_put.c:465:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end, old_ch, new_ch; data/fis-gtm-6.3-007/sr_port/gvcst_put.c:512:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dbg_valbuff[256]; data/fis-gtm-6.3-007/sr_port/gvcst_put.c:837:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, temp_key->base, temp_key->end + 1); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:842:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, value.addr, value.len); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1164:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ztold_mval->str.addr, (sm_uc_ptr_t)rp + cur_val_offset, data_len); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1243:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, temp_key->base + prev_rec_match, target_key_size - prev_rec_match); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1248:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, value.addr, value.len); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1290:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, ((sm_uc_ptr_t)rp + rec_size) - value.len, value.len); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1308:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, value.addr, value.len); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1456:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tempkv->key.base, gv_currkey->base, gv_currkey->end + 1); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1470:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. tempkv->value.addr = (char *)bs1[4].addr;/* but not used in that case, so ok */ data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1660:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, temp_key->base, target_key_size); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1665:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, value.addr, value.len); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1696:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, ((sm_uc_ptr_t)rp + rec_size) - value.len, value.len); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1776:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, temp_key->base + prev_rec_match, target_key_size - prev_rec_match); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1781:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, value.addr, value.len); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1819:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, temp_key->base + prev_rec_match, target_key_size - prev_rec_match); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1823:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, value.addr, value.len); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1832:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, ((sm_uc_ptr_t)rp + rec_size) - value.len, value.len); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1856:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, ((sm_uc_ptr_t)rp + rec_size) - value.len, value.len); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1909:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_altkey, temp_key, SIZEOF(gv_key) + temp_key->end); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1918:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, temp_key->base, rec_cmpc); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:2348:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cp2 = (unsigned char *)bs1[2].addr; data/fis-gtm-6.3-007/sr_port/gvcst_put.c:2357:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cp2 = (unsigned char *)bs1[3].addr; data/fis-gtm-6.3-007/sr_port/gvcst_put.c:2394:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cp2 = (unsigned char *)bs1[3].addr; data/fis-gtm-6.3-007/sr_port/gvcst_put.c:2497:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cse_new->new_buff, cse->new_buff, ((blk_hdr_ptr_t)cse->new_buff)->bsiz); data/fis-gtm-6.3-007/sr_port/gvcst_put.c:2525:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, temp_key->base, target_key_size); data/fis-gtm-6.3-007/sr_port/gvcst_queryget.c:207:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, (sm_uc_ptr_t)rp + rsiz - data_len, data_len); data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:116:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)&cur_region, reg, SIZEOF(gd_region)); data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:117:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)&cur_segment, reg->dyn.addr, SIZEOF(gd_segment)); data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statsDBinitrec[SIZEOF(gvstats_rec_t) * 2]; /* Gives chunk large enuf to hold pad */ data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:176:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(baseDBreg->open); data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:198:28: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (statsDBreg_located->open) /* do the check just in case */ data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:359:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(statsDBinitrec + padsize, baseDBcsa->gvstats_rec_p, SIZEOF(gvstats_rec_t)); data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:441:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:466:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, TREF(util_outbuff_ptr), msglen); /* save message that got us here */ data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:503:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statsDBinitrec[SIZEOF(gvstats_rec_t) * 2]; /* Gives us a chunk large enuf to hold padding */ data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:575:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (baseDBreg->open) data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:592:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&baseDBcsa->gvstats_rec, gvstats_rec_p, SIZEOF(gvstats_rec_t)); data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:635:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (statsDBreg->open && IS_STATSDB_REG(statsDBreg) && statsDBreg->statsDB_setup_completed) data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:686:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(baseDBreg->open); data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:697:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:705:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, TREF(util_outbuff_ptr), msglen); data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:727:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_fname[MAX_FN_LEN + 1], save_basedb_fname[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:752:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_basedb_fname, baseDBseg->fname, save_basedb_fname_len + 1); /* copy trailing '\0' too */ data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:834:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(statsBuf, baseBuf, baseBufLen); data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:843:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_fname, statsBuf, statsBufLen); data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:873:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(baseDBseg->fname, save_basedb_fname, save_basedb_fname_len + 1); data/fis-gtm-6.3-007/sr_port/gvcst_root_search.c:61:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF unsigned char t_fail_hist_dbg[T_FAIL_HIST_DBG_SIZE]; data/fis-gtm-6.3-007/sr_port/gvcst_root_search.c:65:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/gvcst_root_search.c:307:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(global_collation_mstr.addr, rp + hdr_len + SIZEOF(block_id), data/fis-gtm-6.3-007/sr_port/gvcst_search.c:144:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pHist, &pTarg->hist, hist_size); data/fis-gtm-6.3-007/sr_port/gvcst_search.c:560:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c2, pKey->base, n1); data/fis-gtm-6.3-007/sr_port/gvincr_compute_post_incr.c:83:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pre_incr_mval.str.addr, (sm_uc_ptr_t)rp + rec_size - data_len, data_len); data/fis-gtm-6.3-007/sr_port/gvincr_recompute_upd_array.c:158:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, gv_currkey->base + bh->prev_rec.match, target_key_size - bh->prev_rec.match); data/fis-gtm-6.3-007/sr_port/gvincr_recompute_upd_array.c:162:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, value.addr, value.len); data/fis-gtm-6.3-007/sr_port/gvn2gds.c:117:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key, gvn->str.addr + start[contains_env], stop[contains_env] - start[contains_env]); data/fis-gtm-6.3-007/sr_port/gvn2gds.c:164:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strbuff[MAX_KEY_SZ + 1], *str, *str_top; data/fis-gtm-6.3-007/sr_port/gvn2gds.c:165:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fnname[MAX_LEN_FOR_CHAR_FUNC], *c; data/fis-gtm-6.3-007/sr_port/gvn2gds.c:227:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, dollarcharmval.str.addr, dollarcharmval.str.len); data/fis-gtm-6.3-007/sr_port/gvn2gds.c:329:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gvkey->base[0], gds->str.addr, gds->str.len); data/fis-gtm-6.3-007/sr_port/gvnh_spanreg_subs_gvt_init.c:87:35: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((NULL == parmblk) && !reg->open) data/fis-gtm-6.3-007/sr_port/gvstats_rec.c:25:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->nl->gvstats_rec, &csa->hdr->gvstats_rec, SIZEOF(gvstats_rec_t)); data/fis-gtm-6.3-007/sr_port/gvstats_rec.c:30:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->hdr->gvstats_rec, &csa->nl->gvstats_rec, SIZEOF(gvstats_rec_t)); data/fis-gtm-6.3-007/sr_port/gvsub2str.c:57:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[MAX_KEY_SZ + 1], buf1[MAX_KEY_SZ + 1], ch, *ptr, trail_ch, *str, *targ, *targ_end; data/fis-gtm-6.3-007/sr_port/gvsub2str.c:96:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(targ, mstr_targ.addr, targ_len); /* mstr_targ.addr is used just in case it is data/fis-gtm-6.3-007/sr_port/gvzwr_fini.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char m[SIZEOF(mident_fixed)]; data/fis-gtm-6.3-007/sr_port/gvzwr_fini.c:66:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gvzwrite_block->old_key, gv_currkey, SIZEOF(gv_key) + gv_currkey->end); data/fis-gtm-6.3-007/sr_port/gvzwr_fini.c:137:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m[0], local.str.addr, local.str.len); data/fis-gtm-6.3-007/sr_port/gvzwr_out.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port/gvzwrite_clnup.c:52:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_currkey->base[0], &old->base[0], old->end + 1); data/fis-gtm-6.3-007/sr_port/hashtab_implementation.h:738:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bufptr, table, SIZEOF(HASH_TABLE)); data/fis-gtm-6.3-007/sr_port/hashtab_implementation.h:741:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bufptr, table->entry_passed_thru, ROUND_UP(table->size, BITS_PER_UCHAR)); data/fis-gtm-6.3-007/sr_port/hashtab_implementation.h:743:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bufptr, table->base, table->size * SIZEOF(HT_ENT)); data/fis-gtm-6.3-007/sr_port/have_crit.c:81:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (r_local->open && !r_local->was_open) data/fis-gtm-6.3-007/sr_port/i2asc.c:21:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ar[MAX_DIGITS_IN_INT], *q; data/fis-gtm-6.3-007/sr_port/i2asc.c:43:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, q, len); data/fis-gtm-6.3-007/sr_port/i2asc.c:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ar[MAX_DIGITS_IN_INT8], *q; data/fis-gtm-6.3-007/sr_port/i2asc.c:66:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, q, len); data/fis-gtm-6.3-007/sr_port/i2asc.c:72:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ar[MAX_HEX_DIGITS_IN_INT8], *q; data/fis-gtm-6.3-007/sr_port/i2asc.c:93:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, q, len); data/fis-gtm-6.3-007/sr_port/i2asc.c:99:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ar[24], *q; data/fis-gtm-6.3-007/sr_port/i2asc.c:135:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, q, len); data/fis-gtm-6.3-007/sr_port/i2hex_blkfill.c:18:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[8]; data/fis-gtm-6.3-007/sr_port/i2hex_blkfill.c:29:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, buff, len); data/fis-gtm-6.3-007/sr_port/i2hex_blkfill.c:34:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[16]; data/fis-gtm-6.3-007/sr_port/i2hex_blkfill.c:45:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, buff, len); data/fis-gtm-6.3-007/sr_port/i2hex_nofill.c:18:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[8]; data/fis-gtm-6.3-007/sr_port/i2hex_nofill.c:27:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, &buff[i], len - i); data/fis-gtm-6.3-007/sr_port/i2hex_nofill.c:33:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[16]; data/fis-gtm-6.3-007/sr_port/i2hex_nofill.c:42:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, &buff[i], len - i); data/fis-gtm-6.3-007/sr_port/indirection.c:87:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, (TREF(indirection_mval)).str.addr, oldlen); data/fis-gtm-6.3-007/sr_port/indirection.c:98:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, start, len); data/fis-gtm-6.3-007/sr_port/insert_region.c:81:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (tr->reg->open) data/fis-gtm-6.3-007/sr_port/insert_region.c:86:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open) data/fis-gtm-6.3-007/sr_port/insert_region.c:103:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((reg->open) && ((tr->reg->open))) data/fis-gtm-6.3-007/sr_port/insert_region.c:103:33: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((reg->open) && ((tr->reg->open))) data/fis-gtm-6.3-007/sr_port/insert_region.c:121:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (tr->reg->open) data/fis-gtm-6.3-007/sr_port/insert_region.c:126:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open) data/fis-gtm-6.3-007/sr_port/insert_region.c:150:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/insert_region.c:158:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (tr->reg->open) data/fis-gtm-6.3-007/sr_port/insert_region.c:176:57: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((CDB_STAGNATE <= t_tries) && dollar_tlevel && reg->open && !csa->now_crit && (&tp_reg_list == reg_list)) data/fis-gtm-6.3-007/sr_port/int_label.c:28:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(window_ident)).addr, (TREF(window_mval)).str.addr, len); data/fis-gtm-6.3-007/sr_port/int_namelook.c:32:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char temp[NAME_ENTRY_SZ], x; data/fis-gtm-6.3-007/sr_port/io.h:137:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char zb[ESC_LEN]; data/fis-gtm-6.3-007/sr_port/io.h:138:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[DD_BUFLEN]; data/fis-gtm-6.3-007/sr_port/io.h:139:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char device[DD_BUFLEN]; data/fis-gtm-6.3-007/sr_port/io.h:192:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dollar_io[1]; /* _$IO hidden variable */ data/fis-gtm-6.3-007/sr_port/io.h:201:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). short (*open)(io_log_name *, mval *, int, mval *, int4); data/fis-gtm-6.3-007/sr_port/io.h:260:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ioxx(open); data/fis-gtm-6.3-007/sr_port/io.h:537:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(writebuffer, ERRSTR, errlen); \ data/fis-gtm-6.3-007/sr_port/io.h:548:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(writebuffer, ONE_COMMA, prefixlen); \ data/fis-gtm-6.3-007/sr_port/io.h:549:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&writebuffer[prefixlen], ERRSTR, errlen); \ data/fis-gtm-6.3-007/sr_port/io.h:561:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(writebuffer, ONE_COMMA, prefixlen); \ data/fis-gtm-6.3-007/sr_port/io.h:562:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&writebuffer[prefixlen], ERRSTR1, errlen1); \ data/fis-gtm-6.3-007/sr_port/io.h:563:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&writebuffer[prefixlen + errlen1], ERRSTR2, errlen2); \ data/fis-gtm-6.3-007/sr_port/io.h:575:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(writebuffer, ONE_COMMA, prefixlen); \ data/fis-gtm-6.3-007/sr_port/io.h:576:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&writebuffer[prefixlen], errstring, errlen); \ data/fis-gtm-6.3-007/sr_port/io_init.c:51:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char open_params_list[2] = data/fis-gtm-6.3-007/sr_port/io_init.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[MAX_TRANS_NAME_LEN]; /* buffer to hold translated name */ data/fis-gtm-6.3-007/sr_port/ionl_use.c:31:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF unsigned char filter_index[27]; data/fis-gtm-6.3-007/sr_port/iorm_wtone.c:27:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uni_buf[GTM_MB_LEN_MAX], *endptr; data/fis-gtm-6.3-007/sr_port/iosocket_bind.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_port/iosocket_bind.c:294:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dsocketptr->iod->dollar.key[0], BOUND, len); data/fis-gtm-6.3-007/sr_port/iosocket_bind.c:296:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dsocketptr->iod->dollar.key[len], socketptr->handle, socketptr->handle_len); data/fis-gtm-6.3-007/sr_port/iosocket_close.c:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sock_handle[MAX_HANDLE_LEN], *errp; data/fis-gtm-6.3-007/sr_port/iosocket_close.c:88:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sock_handle, (char *)(pp->str.addr + p_offset + 1), handle_len); data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipaddr[SA_MAXLEN + 1]; data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:140:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(remote_ai_ptr, sockptr->remote.ai_head, SIZEOF(struct addrinfo)); data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:179:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(remote_ai_ptr, raw_ai_ptr, SIZEOF(struct addrinfo)); data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:483:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (stringpool.free, (unsigned char *)newdsocket, d_socket_struct_len); data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:501:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iod->dollar.key[0], ESTABLISHED, len); data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:503:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iod->dollar.key[len], sockptr->handle, sockptr->handle_len); data/fis-gtm-6.3-007/sr_port/iosocket_create.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_addr[SA_MAXLITLEN], protocolstr[6], *adptr; data/fis-gtm-6.3-007/sr_port/iosocket_create.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host_buffer[NI_MAXHOST]; data/fis-gtm-6.3-007/sr_port/iosocket_create.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_port/iosocket_create.c:175:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ai_ptr, addr_info_ptr, SIZEOF(struct addrinfo)); data/fis-gtm-6.3-007/sr_port/iosocket_create.c:200:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(temp_addr, &sockaddr[1], addrlen); data/fis-gtm-6.3-007/sr_port/iosocket_create.c:202:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(temp_addr, sockaddr, addrlen); data/fis-gtm-6.3-007/sr_port/iosocket_create.c:235:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sa_un_ptr->sun_path, transpath.addr, transpath.len); data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:37:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *c, *top, delimiter[MAX_DELIM_LEN + 1]; data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:70:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(socketptr->delimiter[ii].addr, delimiter, counter - 1); data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:106:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(socketptr->delimiter[ii].addr, delimiter, counter); data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:151:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(socketptr->idelimiter[delim_index].addr, conv_buff, new_delim_len); data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:190:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(socketptr->odelimiter0.addr, conv_buff, new_len); data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:209:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(to->delimiter[delim_index].addr, from->delimiter[delim_index].addr, from->delimiter[delim_index].len); data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:214:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(to->idelimiter[delim_index].addr, from->idelimiter[delim_index].addr, data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:222:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(to->odelimiter0.addr, from->odelimiter0.addr, from->odelimiter0.len); data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char action[MAX_DEVCTL_LENGTH]; data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:251:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d->addr, iod->dollar.key, len); data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:302:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, d->addr, totlen); data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:318:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zkeyptr, LISTENING, len); data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:322:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zkeyptr, READ, len); data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:327:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zkeyptr, socketptr->handle, socketptr->handle_len); data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:341:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zkeyptr, socketptr->remote.saddr_ip, len); data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:356:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zkeyptr, charptr, len); data/fis-gtm-6.3-007/sr_port/iosocket_listen.c:90:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dsocketptr->iod->dollar.key[0], LISTENING, len); data/fis-gtm-6.3-007/sr_port/iosocket_listen.c:92:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dsocketptr->iod->dollar.key[len], socketptr->handle, socketptr->handle_len); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[SA_MAXLITLEN], *errptr, sockaddr[SA_MAXLITLEN], data/fis-gtm-6.3-007/sr_port/iosocket_open.c:104:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char delimiter_buffer[MAX_N_DELIMITER * (MAX_DELIM_LEN + 1)], zff_buffer[MAX_ZFF_LEN]; data/fis-gtm-6.3-007/sr_port/iosocket_open.c:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ioerror, data/fis-gtm-6.3-007/sr_port/iosocket_open.c:108:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipaddr[SA_MAXLEN]; data/fis-gtm-6.3-007/sr_port/iosocket_open.c:174:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newdsocket, (d_socket_struct *)mv_zintdev->mv_st_cont.mvs_zintdev.curr_sp_buffer.addr, data/fis-gtm-6.3-007/sr_port/iosocket_open.c:193:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newdsocket, dsocketptr, d_socket_struct_len); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:194:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ioptr->dollar.device, "0", SIZEOF("0")); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:208:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(delimiter_buffer, (pp->str.addr + p_offset + 1), delimiter_len); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:306:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sockaddr, pp->str.addr + p_offset + 1, len); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:317:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sockaddr, pp->str.addr + p_offset + 1, len); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:334:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sock_handle, pp->str.addr + p_offset + 1, handle_len); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:341:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zff_buffer, (char *)(pp->str.addr + p_offset + 1), zff_len); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:471:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(socketptr->handle, sock_handle, handle_len); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:529:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curr_socketptr->zff.addr, zff_buffer, zff_len); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:552:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ioptr->dollar.key[0], ESTABLISHED, len); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:555:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ioptr->dollar.key[len], socketptr->handle, MIN(socketptr->handle_len, DD_BUFLEN - len - 2)); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:666:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(localsocketptr->ozff.addr, conv_buff, new_ozff_len); data/fis-gtm-6.3-007/sr_port/iosocket_open.c:676:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dsocketptr, newdsocket, d_socket_struct_len); data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:110:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.zb, delimptr, MIN(delimlen, ESC_LEN - 1)); data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:112:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.key, delimptr, MIN(delimlen, DD_BUFLEN - 1)); data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:297:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, buffer_start, bytes_read); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:659:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.zb, socketptr->delimiter[ii].addr, data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:662:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.key, socketptr->delimiter[ii].addr, data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:894:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.device, "0", SIZEOF("0")); data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:106:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, (void *)(socketptr->buffer + socketptr->buffered_offset), bytesread); data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:136:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, socketptr->buffer, bytesread); data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:139:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, socketptr->buffer, maxlength); data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:373:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(socketptr->buffer, (socketptr->buffer + socketptr->buffered_offset), socketptr->buffered_length); data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:436:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_buff, buffer, len); data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:438:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_buff + len, socketptr->buffer + socketptr->buffered_offset, socketptr->buffered_length); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:50:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF unsigned char filter_index[27]; data/fis-gtm-6.3-007/sr_port/iosocket_use.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char handlea[MAX_HANDLE_LEN], handles[MAX_HANDLE_LEN], handled[MAX_HANDLE_LEN]; data/fis-gtm-6.3-007/sr_port/iosocket_use.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[SA_MAXLITLEN], *errptr, sockaddr[SA_MAXLITLEN], data/fis-gtm-6.3-007/sr_port/iosocket_use.c:86:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char delimiter_buffer[MAX_N_DELIMITER * (MAX_DELIM_LEN + 1)]; data/fis-gtm-6.3-007/sr_port/iosocket_use.c:87:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char zff_buffer[MAX_ZFF_LEN]; data/fis-gtm-6.3-007/sr_port/iosocket_use.c:184:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(handlea, (char *)(pp->str.addr + p_offset + 1), handlea_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:190:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(handled, (char *)(pp->str.addr + p_offset + 1), handled_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:198:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sockaddr, (char *)(pp->str.addr + p_offset + 1), int_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:208:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(delimiter_buffer, (pp->str.addr + p_offset + 1), delimiter_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:244:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sockaddr, (char *)(pp->str.addr + p_offset + 1), int_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:254:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(handles, (char *)(pp->str.addr + p_offset + 1), handles_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:295:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zff_buffer, (char *)(pp->str.addr + p_offset + 1), zff_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:388:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newdsocket, dsocketptr, d_socket_struct_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:400:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newdsocket, dsocketptr, d_socket_struct_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:403:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dsocketptr, newdsocket, d_socket_struct_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:429:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dsocketptr, newdsocket, d_socket_struct_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:453:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(socketptr->handle, handles, handles_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:544:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newsocket.zff.addr, zff_buffer, zff_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:612:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(localsocketptr->ozff.addr, conv_buff, new_ozff_len); data/fis-gtm-6.3-007/sr_port/iosocket_use.c:669:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newsocket.buffer, socketptr->buffer + socketptr->buffered_offset, data/fis-gtm-6.3-007/sr_port/iosocket_use.c:702:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dsocketptr, newdsocket, d_socket_struct_len); data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:435:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iod->dollar.key[0], READ, len); data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:437:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iod->dollar.key[len], socketptr->handle, socketptr->handle_len); data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:469:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer[NI_MAXSERV], ipaddr[SA_MAXLEN + 1]; data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:599:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dsocketptr->iod->dollar.key[0], CONNECTED, len); data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:601:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dsocketptr->iod->dollar.key[len], newsocketptr->handle, newsocketptr->handle_len); data/fis-gtm-6.3-007/sr_port/iosocket_write.c:349:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)(socketptr->obuffer + socketptr->obuffer_offset), buffer, length); data/fis-gtm-6.3-007/sr_port/iosocket_write.c:458:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(socketptr->ozff.addr, stringpool.free, new_len); data/fis-gtm-6.3-007/sr_port/iosocket_write.c:477:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.device, "0", SIZEOF("0")); data/fis-gtm-6.3-007/sr_port/iosocket_wtone.c:28:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c, uni_c[4], *endptr; data/fis-gtm-6.3-007/sr_port/iosocketdef.h:135:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(SOCKADDRESS.sa, SOCKADDRPTR, SOCKADDRLEN); \ data/fis-gtm-6.3-007/sr_port/iosocketdef.h:188:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(NEWSOCKPTR->zff.addr, SOCKPTR->zff.addr, SOCKPTR->zff.len); \ data/fis-gtm-6.3-007/sr_port/iosocketdef.h:192:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(NEWSOCKPTR->ozff.addr, SOCKPTR->ozff.addr, SOCKPTR->ozff.len); \ data/fis-gtm-6.3-007/sr_port/iosocketdef.h:204:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(NEWSOCKPTR->local.sa, SOCKPTR->local.sa, SOCKPTR->local.ai.ai_addrlen); \ data/fis-gtm-6.3-007/sr_port/iosocketdef.h:210:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(NEWSOCKPTR->remote.sa, SOCKPTR->remote.sa, SOCKPTR->remote.ai.ai_addrlen); \ data/fis-gtm-6.3-007/sr_port/iosocketdef.h:310:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char handle[MAX_HANDLE_LEN]; data/fis-gtm-6.3-007/sr_port/iott_wtone.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p[1]; data/fis-gtm-6.3-007/sr_port/iott_wtone.c:29:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char utf_buf[GTM_MB_LEN_MAX], *up; data/fis-gtm-6.3-007/sr_port/is_ident.c:15:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char ctypetab[NUM_CHARS]; data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c:40:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header->label, JNL_LABEL_TEXT, STR_LIT_LEN(JNL_LABEL_TEXT)); data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c:44:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&header->who_created, (unsigned char*)prc_vec, SIZEOF(jnl_process_vector)); data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c:45:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&header->who_opened, (unsigned char*)prc_vec, SIZEOF(jnl_process_vector)); data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c:63:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header->data_file_name, info->fn, info->fn_len); data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c:71:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header->prev_jnl_file_name, info->prev_jnl, info->prev_jnl_len); data/fis-gtm-6.3-007/sr_port/jnl.h:355:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jpv_node[JPV_LEN_NODE], /* Node name */ data/fis-gtm-6.3-007/sr_port/jnl.h:525:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[1]; /* Actually buff[size] */ data/fis-gtm-6.3-007/sr_port/jnl.h:671:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[SIZEOF(JNL_LABEL_TEXT) - 1]; data/fis-gtm-6.3-007/sr_port/jnl.h:675:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_align8[7]; data/fis-gtm-6.3-007/sr_port/jnl.h:714:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data_file_name[JNL_NAME_SIZE]; /* Database file name */ data/fis-gtm-6.3-007/sr_port/jnl.h:715:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char prev_jnl_file_name[JNL_NAME_SIZE]; /* Previous generation journal file name */ data/fis-gtm-6.3-007/sr_port/jnl.h:716:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char next_jnl_file_name[JNL_NAME_SIZE]; /* Next generation journal file name */ data/fis-gtm-6.3-007/sr_port/jnl.h:719:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encryption_hash[GTMCRYPT_RESERVED_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/jnl.h:720:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encryption_hash2[GTMCRYPT_RESERVED_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/jnl.h:724:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encr_filler[80]; data/fis-gtm-6.3-007/sr_port/jnl.h:732:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[432]; data/fis-gtm-6.3-007/sr_port/jnl.h:743:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char jnl[JNL_NAME_SIZE], data/fis-gtm-6.3-007/sr_port/jnl.h:767:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encryption_hash[GTMCRYPT_RESERVED_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/jnl.h:768:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encryption_hash2[GTMCRYPT_RESERVED_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/jnl.h:818:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1]; /* Actually text[length] */ data/fis-gtm-6.3-007/sr_port/jnl.h:913:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char blk_contents[1]; /* Actually blk_contents[bsiz] */ data/fis-gtm-6.3-007/sr_port/jnl.h:945:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jnl_tid[TID_STR_SIZE]; data/fis-gtm-6.3-007/sr_port/jnl.h:1156:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unique_id[UNIQUE_ID_SIZE]; data/fis-gtm-6.3-007/sr_port/jnl.h:1762:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iv[GTM_MAX_IV_LEN]; \ data/fis-gtm-6.3-007/sr_port/jnl2ext.c:88:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, origbuf, tmpsize); data/fis-gtm-6.3-007/sr_port/jnl2ext.c:111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_buff[SIZEOF(gv_key) + MAX_KEY_SZ + 7]; data/fis-gtm-6.3-007/sr_port/jnl2ext.c:175:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curr, ptr, tid_len); data/fis-gtm-6.3-007/sr_port/jnl2ext.c:249:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key->base, &keystr->text[0], keystr->length); data/fis-gtm-6.3-007/sr_port/jnl_file_close.c:62:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hdr_base[REAL_JNL_HDR_LEN + MAX_IO_BLOCK_SIZE]; data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c:82:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hdr_buff[REAL_JNL_HDR_LEN + MAX_IO_BLOCK_SIZE]; data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c:85:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char eof_rec[(DISK_BLOCK_SIZE * 2) + MAX_IO_BLOCK_SIZE]; data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c:153:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&eof_record, (unsigned char *)eof_rec_buffer + adjust, EOF_RECLEN); data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c:231:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&jb->buff[ROUND_DOWN2(jb->free, jnl_fs_block_size) + jb->buff_off], eof_rec_buffer, adjust); data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c:260:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&header->who_opened, prc_vec, SIZEOF(jnl_process_vector)); data/fis-gtm-6.3-007/sr_port/jnl_file_open_switch.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prev_jnl_fn[JNL_NAME_SIZE]; data/fis-gtm-6.3-007/sr_port/jnl_flush.c:40:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg || !reg->open) data/fis-gtm-6.3-007/sr_port/jnl_format.c:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iv[GTM_MAX_IV_LEN]; data/fis-gtm-6.3-007/sr_port/jnl_format.c:305:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(local_buffer, (uchar_ptr_t)key->base, keystrlen); data/fis-gtm-6.3-007/sr_port/jnl_format.c:318:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(local_buffer, (uchar_ptr_t)val->str.addr, valstrlen); data/fis-gtm-6.3-007/sr_port/jnl_format.c:353:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jfb->alt_buff, rec, jrec_size); data/fis-gtm-6.3-007/sr_port/jnl_pool_write.c:151:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(local_jnlpool->jnldata_base + write, jnlrecptr, rlen); data/fis-gtm-6.3-007/sr_port/jnl_pool_write.c:154:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(local_jnlpool->jnldata_base + write, jnlrecptr, dstlen); data/fis-gtm-6.3-007/sr_port/jnl_pool_write.c:155:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(local_jnlpool->jnldata_base, jnlrecptr + dstlen, rlen - dstlen); data/fis-gtm-6.3-007/sr_port/jnl_wait.c:31:37: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((NULL != reg) && (TRUE == reg->open)) data/fis-gtm-6.3-007/sr_port/jnl_write.c:75:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&lcl_buff[lcl_free], src, len); \ data/fis-gtm-6.3-007/sr_port/jnl_write.c:81:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&lcl_buff[lcl_free], src, size_before_wrap); \ data/fis-gtm-6.3-007/sr_port/jnl_write.c:83:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&lcl_buff[0], src + size_before_wrap, lcl_free); \ data/fis-gtm-6.3-007/sr_port/jnl_write.c:339:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lcl_buff + lcl_free, (uchar_ptr_t)jnl_rec, rlen); data/fis-gtm-6.3-007/sr_port/jnl_write.c:377:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lcl_buff + lcl_free, (uchar_ptr_t)jnl_rec, FIXED_BLK_RECLEN); data/fis-gtm-6.3-007/sr_port/jnl_write.c:380:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lcl_buff + lcl_free, (uchar_ptr_t)blk_ptr, jrec_blk->bsiz); data/fis-gtm-6.3-007/sr_port/jnl_write.c:408:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lcl_buff + lcl_free, (uchar_ptr_t)jrec_align, FIXED_ALIGN_RECLEN); data/fis-gtm-6.3-007/sr_port/jnl_write.c:443:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lcl_buff + lcl_free, (uchar_ptr_t)jfb->buff, rlen); data/fis-gtm-6.3-007/sr_port/jnl_write_aimg_rec.c:80:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pvt_crypt_buf.addr, buffer, SIZEOF(blk_hdr)); /* copy the block header */ data/fis-gtm-6.3-007/sr_port/jnl_write_epoch_rec.c:51:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hdr_base[REAL_JNL_HDR_LEN + MAX_IO_BLOCK_SIZE]; data/fis-gtm-6.3-007/sr_port/jnl_write_pini.c:75:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char*)&pini_record.process_vector[ORIG_JPV], data/fis-gtm-6.3-007/sr_port/jnl_write_pini.c:85:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char*)&pini_record.process_vector[ORIG_JPV], data/fis-gtm-6.3-007/sr_port/jnl_write_pini.c:93:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char*)&pini_record.process_vector[CURR_JPV], (unsigned char*)prc_vec, SIZEOF(jnl_process_vector)); data/fis-gtm-6.3-007/sr_port/jnl_write_reserve.c:49:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(JRS->jrs_array, jre, usedlen * SIZEOF(jrec_rsrv_elem_t)); \ data/fis-gtm-6.3-007/sr_port/jobexam_process.c:47:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char dumpable_error_dump_file_parms[2] = {iop_newversion, iop_eol}; data/fis-gtm-6.3-007/sr_port/jobexam_process.c:48:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char dumpable_error_dump_file_noparms[1] = {iop_eol}; data/fis-gtm-6.3-007/sr_port/jobexam_process.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char saved_util_outbuff[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_port/jobexam_process.c:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char save_dump_file_name_buff[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_port/jobexam_process.c:149:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(saved_util_outbuff, TREF(util_outbuff_ptr), saved_util_outbuff_len); data/fis-gtm-6.3-007/sr_port/jobexam_process.c:155:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TREF(util_outbuff_ptr), saved_util_outbuff, saved_util_outbuff_len); data/fis-gtm-6.3-007/sr_port/jobexam_process.c:188:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dump_file_name[DEFAULT_DUMP_FILE_TOTSIZE], *dump_file_name_ptr; data/fis-gtm-6.3-007/sr_port/jobexam_process.c:218:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fatal_file_name_buff, dump_file_spec->str.addr, dump_file_spec->str.len); data/fis-gtm-6.3-007/sr_port/jobinterrupt_init.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trans_bufr[MAX_TRANS_NAME_LEN]; data/fis-gtm-6.3-007/sr_port/jobinterrupt_process.c:96:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mv_st_ent->mv_st_cont.mvs_zintr.savextref.addr, extnam_str.addr, extnam_str.len); data/fis-gtm-6.3-007/sr_port/jobinterrupt_process.c:103:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mv_st_ent->mv_st_cont.mvs_zintr.dollar_ecode_save, &dollar_ecode, SIZEOF(dollar_ecode)); data/fis-gtm-6.3-007/sr_port/jobinterrupt_process.c:104:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mv_st_ent->mv_st_cont.mvs_zintr.dollar_stack_save, &dollar_stack, SIZEOF(dollar_stack)); data/fis-gtm-6.3-007/sr_port/jobinterrupt_process_cleanup.c:42:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msgbuf[OUT_BUFF_SIZE], *mbptr; data/fis-gtm-6.3-007/sr_port/jobinterrupt_process_cleanup.c:83:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mbptr, zstptr, zstlen); data/fis-gtm-6.3-007/sr_port/jobparameters.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parastr[3000]; data/fis-gtm-6.3-007/sr_port/lb_init.c:27:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char ctypetab[NUM_CHARS]; data/fis-gtm-6.3-007/sr_port/lb_init.c:40:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char original_source[MAX_SRCLINE + 1]; data/fis-gtm-6.3-007/sr_port/lb_init.c:48:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(original_source, (TREF(source_buffer)).addr, (TREF(source_buffer)).len + 1); /* include NUL term chars */ data/fis-gtm-6.3-007/sr_port/lke_clean.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char regbuf[MAX_RN_LEN], nodebuf[32], one_lockbuf[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/lke_clean.c:95:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). && reg->open) data/fis-gtm-6.3-007/sr_port/lke_clean.c:132:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sub->data, "A12345670123456776543210", 24); data/fis-gtm-6.3-007/sr_port/lke_clean.c:170:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sub->data, "A12345678901234567890123456789012", 33); data/fis-gtm-6.3-007/sr_port/lke_clean.c:278:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_buffer[MAX_ZWR_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/lke_clear.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char regbuf[MAX_RN_LEN], nodebuf[32], one_lockbuf[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/lke_clear.c:85:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). reg->open) data/fis-gtm-6.3-007/sr_port/lke_clearlock.c:100:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reply.lockname, name->addr, len); data/fis-gtm-6.3-007/sr_port/lke_cleartree.c:58:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char subscript_offset[KDIM]; data/fis-gtm-6.3-007/sr_port/lke_cleartree.c:59:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name_buffer[MAX_ZWR_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/lke_getcli.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char one_lockbuf[MAX_ZWR_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/lke_getcli.c:121:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(one_lock->addr, one_lockbuf, keylen); data/fis-gtm-6.3-007/sr_port/lke_getki.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char one_lockbuf[MAX_ZWR_KEY_SZ + 1], *one_char; data/fis-gtm-6.3-007/sr_port/lke_getki.c:51:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outbuff, src, srclen); data/fis-gtm-6.3-007/sr_port/lke_getki.c:56:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, src, inptr - src); data/fis-gtm-6.3-007/sr_port/lke_getki.c:95:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, inptr, nextptr - inptr); data/fis-gtm-6.3-007/sr_port/lke_getki.c:131:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, subsc.str.addr, subsc.str.len); data/fis-gtm-6.3-007/sr_port/lke_getki.c:137:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, inptr, nextptr - inptr); data/fis-gtm-6.3-007/sr_port/lke_growhash.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char regbuf[MAX_RN_LEN], nodebuf[32], one_lockbuf[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/lke_growhash.c:70:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). && reg->open) data/fis-gtm-6.3-007/sr_port/lke_show.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char regbuf[MAX_RN_LEN], nodebuf[32], one_lockbuf[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/lke_show.c:96:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). && reg->open) data/fis-gtm-6.3-007/sr_port/lke_show.c:134:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)ctl, (uchar_ptr_t)csa->mlkctl, ls_len); data/fis-gtm-6.3-007/sr_port/lke_show.c:140:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pctl2.shrhash, pctl.shrhash, SIZEOF(mlk_shrhash) * pctl.shrhash_size); data/fis-gtm-6.3-007/sr_port/lke_showlock.c:85:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name->addr, value->data, value->length); data/fis-gtm-6.3-007/sr_port/lke_showlock.c:142:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[NODE_SIZE], gtcmbuf[NODE_SIZE]; /* gtcmbuf[] holds ": CLNTNODE = %s : CLNTPID = %d" */ data/fis-gtm-6.3-007/sr_port/lke_showlock.c:185:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(>cmbuf[gtcmbufidx], CLNTNODE_LIT, STR_LIT_LEN(CLNTNODE_LIT)); data/fis-gtm-6.3-007/sr_port/lke_showlock.c:187:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(>cmbuf[gtcmbufidx], node->auxnode, SIZEOF(node->auxnode)); data/fis-gtm-6.3-007/sr_port/lke_showlock.c:189:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(>cmbuf[gtcmbufidx], CLNTPID_LIT, STR_LIT_LEN(CLNTPID_LIT)); data/fis-gtm-6.3-007/sr_port/lke_showlock.c:209:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(format, msg, len1); data/fis-gtm-6.3-007/sr_port/lke_showlock.c:220:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(format + len1, msg, len2); data/fis-gtm-6.3-007/sr_port/lke_showtree.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[MAX_ZWR_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/lke_showtree.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_prefix[KDIM + 2]; data/fis-gtm-6.3-007/sr_port/lke_showtree.c:56:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(temp, dsub->data, dsub->length); data/fis-gtm-6.3-007/sr_port/lke_showtree.c:118:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char subscript_offset[KDIM]; data/fis-gtm-6.3-007/sr_port/lke_showtree.c:119:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name_buffer[MAX_ZWR_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/lkglvn.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *lknam, lkname_buf[MAX_MIDENT_LEN + 1], x; data/fis-gtm-6.3-007/sr_port/lkglvn.c:96:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lknam, (TREF(window_ident)).addr, (TREF(window_ident)).len); data/fis-gtm-6.3-007/sr_port/logical_truth_value.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/fis-gtm-6.3-007/sr_port/lv_tree.c:679:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cloneNode->key_mvtype, &node->key_mvtype, 8); /* Asserts above keep the 8 byte length secure */ data/fis-gtm-6.3-007/sr_port/lv_tree.h:289:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cloneTree, (LVT), OFFSETOF(lvTree, avl_height) + SIZEOF(LVT->avl_height)); \ data/fis-gtm-6.3-007/sr_port/lvmon_pull_values.c:42:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lvmon_val_ent_p->varvalue.addr, (VALUE), len); \ data/fis-gtm-6.3-007/sr_port/lvzwr_fini.c:88:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m.c[0], local.str.addr, local.str.len); data/fis-gtm-6.3-007/sr_port/lvzwr_key.c:34:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, lvzwrite_block->curr_name->addr, len); data/fis-gtm-6.3-007/sr_port/lvzwr_key.c:50:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, sub.addr, sub.len); data/fis-gtm-6.3-007/sr_port/lvzwr_out.c:302:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, mglvnp->gblp[IND1]->s_gv_currkey->base, mglvnp->gblp[IND1]->s_gv_currkey->end + 1); data/fis-gtm-6.3-007/sr_port/lvzwr_var.c:275:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[512], *end; data/fis-gtm-6.3-007/sr_port/m_close.c:24:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char empty_plist[1] = { iop_eol }; data/fis-gtm-6.3-007/sr_port/m_job.c:37:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char empty_plist[1] = { jp_eol }; data/fis-gtm-6.3-007/sr_port/m_open.c:31:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char empty_plist[1] = { iop_eol }; data/fis-gtm-6.3-007/sr_port/m_set.c:143:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char unibytes_val[4]; data/fis-gtm-6.3-007/sr_port/m_set.c:570:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(unichar.unibytes_val, data/fis-gtm-6.3-007/sr_port/m_tstart.c:35:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char tst_param_index[27] = data/fis-gtm-6.3-007/sr_port/m_use.c:25:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char empty_plist[1] = { iop_eol }; data/fis-gtm-6.3-007/sr_port/m_write.c:129:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, msp->addr, lnx); data/fis-gtm-6.3-007/sr_port/m_xecute.c:85:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(source_buffer)).addr,src->addr,src->len); data/fis-gtm-6.3-007/sr_port/m_zstep.c:34:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char zstep_index[27] = data/fis-gtm-6.3-007/sr_port/md5hash.c:118:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, buf, len); data/fis-gtm-6.3-007/sr_port/md5hash.c:121:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, buf, t); data/fis-gtm-6.3-007/sr_port/md5hash.c:130:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->in, buf, 64); data/fis-gtm-6.3-007/sr_port/md5hash.c:138:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->in, buf, len); data/fis-gtm-6.3-007/sr_port/md5hash.c:147:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[16]; data/fis-gtm-6.3-007/sr_port/md5hash.c:209:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char inraw[64]; data/fis-gtm-6.3-007/sr_port/md5hash.h:29:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in[MD5_BLOCK_LENGTH]; data/fis-gtm-6.3-007/sr_port/md5hash.h:34:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void cvs_MD5Final(unsigned char digest[MD5_DIGEST_LENGTH], struct cvs_MD5Context *context); data/fis-gtm-6.3-007/sr_port/md5hash.h:35:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void cvs_MD5Transform(cvs_uint32 buf[4], const unsigned char in[MD5_BLOCK_LENGTH]); data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c:266:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src_line[MAX_ENTRYREF_LEN]; data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c:424:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sig, tp_restart_fail_sig, (tp_restart_fail_sig->chf$l_sig_args + 1) * SIZEOF(int)); data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c:463:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(gv_cur_region->open); data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c:595:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg_local->open && !reg_local->was_open) data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c:612:88: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((NULL != local_jnlpool->jnlpool_dummy_reg) && local_jnlpool->jnlpool_dummy_reg->open) data/fis-gtm-6.3-007/sr_port/mdef.h:332:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[PRE_V5_MAX_MIDENT_LEN]; data/fis-gtm-6.3-007/sr_port/mdef.h:339:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[MAX_MIDENT_LEN + 1]; data/fis-gtm-6.3-007/sr_port/mdef.h:1267:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst+start,src,count); \ data/fis-gtm-6.3-007/sr_port/mdef.h:1537:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char created_nodename[MAX_NODENAME_LEN]; /* Nodename on which instance file was created */ data/fis-gtm-6.3-007/sr_port/mdef.h:1538:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char this_instname[MAX_INSTNAME_LEN]; /* Instance name that this file corresponds to */ data/fis-gtm-6.3-007/sr_port/mdef.h:1601:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char root_primary_instname[MAX_INSTNAME_LEN];/* the root primary instance that generated this history record */ data/fis-gtm-6.3-007/sr_port/mdef.h:1626:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_8[2]; /* Filler for 8-byte alignment */ data/fis-gtm-6.3-007/sr_port/mdef.h:1726:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_16[12]; data/fis-gtm-6.3-007/sr_port/merge_desc_check.c:65:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff1[MAX_ZWR_KEY_SZ], buff2[MAX_ZWR_KEY_SZ], *end1, *end2; data/fis-gtm-6.3-007/sr_port/merge_desc_check.c:147:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/merge_desc_check.c:154:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/mlabel2xtern.c:30:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pt, rtn->addr, rtn->len); data/fis-gtm-6.3-007/sr_port/mlabel2xtern.c:38:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pt, lab->addr, lab->len); data/fis-gtm-6.3-007/sr_port/mlk_lock.c:172:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d->auxnode, data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_create.c:138:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, (mp_temp)->str.addr, len); data/fis-gtm-6.3-007/sr_port/mlk_region_lookup.c:49:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/mlk_region_lookup.c:64:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/mlk_region_lookup.c:73:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/mlk_shrblk_create.c:88:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(subptr->data, val, len); data/fis-gtm-6.3-007/sr_port/mlk_shrclean.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dead_table[PROC_TABLE_SIZE]; data/fis-gtm-6.3-007/sr_port/mlkdef.h:62:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char auxnode[16]; /* If non-zero auxowner, this is the nodename of the client that is holding the lock */ data/fis-gtm-6.3-007/sr_port/mlkdef.h:111:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[1]; /* the data itself, actually data[length] */ data/fis-gtm-6.3-007/sr_port/mlkdef.h:215:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char filler[5]; /* Fill out to align data on word boundary */ data/fis-gtm-6.3-007/sr_port/mlkdef.h:222:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char value[1]; /* Actually, an array unsigned char value[N], where N is based on the data/fis-gtm-6.3-007/sr_port/mmemory.h:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[1]; /* beginning of the allocatable area (NOTE: should be last member) */ data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:257:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(mprof_ptr))->gbl_to_fill.str.addr, gvn->str.addr, gvn->str.len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:556:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e.label_name->addr, (TREF(prof_fp))->label_name->addr, (TREF(prof_fp))->label_name->len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:560:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e.rout_name->addr, (TREF(prof_fp))->rout_name->addr, (TREF(prof_fp))->rout_name->len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:703:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dataval[96]; /* Big enough for data value. */ data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:704:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char subsval[12]; /* See i2asc + 1 for null char. */ data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:705:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char asc_line_num[12]; /* To hold the ascii equivalent of the line_num. */ data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:719:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(spt->str.addr, p->e.rout_name->addr, spt->str.len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:726:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(spt->str.addr, p->e.label_name->addr, spt->str.len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:731:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(spt->str.addr, MPROF_NULL_LABEL, spt->str.len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:740:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(spt->str.addr, asc_line_num, spt->str.len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:751:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(spt->str.addr, MPROF_FOR_LOOP, spt->str.len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:758:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(spt->str.addr, subsval, spt->str.len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:796:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data.str.addr, dataval, data.str.len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:807:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dataval[96]; /* Big enough for data value. */ data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:820:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(spt->str.addr, PROCESS_TIME, spt->str.len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:825:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(spt->str.addr, CHILDREN_TIME, spt->str.len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:856:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data.str.addr, dataval, data.str.len); data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:1037:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mpsp, dollar_job.str.addr, dollar_job.str.len); data/fis-gtm-6.3-007/sr_port/mprof_tree.c:52:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arg->rout_name->addr, tmp_rout_name->addr, tmp_rout_name->len); data/fis-gtm-6.3-007/sr_port/mprof_tree.c:61:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arg->label_name->addr, tmp_label_name->addr, tmp_label_name->len); data/fis-gtm-6.3-007/sr_port/mrout2xtern.h:18:37: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define MROUT2XTERN(src, dst, len) memcpy(dst, src, len) data/fis-gtm-6.3-007/sr_port/mtables.c:45:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF char ctypetab[NUM_CHARS] = data/fis-gtm-6.3-007/sr_port/mtables.c:203:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char localpool[15] = {'-', '1', '1', '1', '0', '1', '0', '0', '5', '2', '4', '2', '8', '6'}; data/fis-gtm-6.3-007/sr_port/mu_clsce.c:97:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char oldblk1_prev_key[MAX_KEY_SZ+1], data/fis-gtm-6.3-007/sr_port/mu_clsce.c:199:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&old_levelp_cur_key[0], &old_levelp_cur_prev_key[0], tkeycmpc); data/fis-gtm-6.3-007/sr_port/mu_clsce.c:221:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(old_levelp_cur_next_key, &old_levelp_cur_key[0], tkeycmpc); data/fis-gtm-6.3-007/sr_port/mu_clsce.c:252:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (oldblk1_last_key, &old_levelp_cur_key[0], old_levelp_cur_keysz); data/fis-gtm-6.3-007/sr_port/mu_clsce.c:416:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newblk2_first_key, newblk1_last_key, tkeycmpc); /* copy the compressed piece */ data/fis-gtm-6.3-007/sr_port/mu_clsce.c:466:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newblk1_last_key, new_blk2_ances_first_key, newblk1_last_keysz); data/fis-gtm-6.3-007/sr_port/mu_clsce.c:582:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bn_ptr1, old_blk1_base + old_blk1_sz - SIZEOF(block_id), SIZEOF(block_id)); data/fis-gtm-6.3-007/sr_port/mu_clsce.c:666:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bn_ptr2, old_levelp_blk_base + old_levelp_rec_offset + SIZEOF(rec_hdr) + old_levelp_cur_keylen, SIZEOF(block_id)); data/fis-gtm-6.3-007/sr_port/mu_clsce.c:779:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_currkey_next_reorg->base[0], newblk2_first_key, newblk2_first_keysz); data/fis-gtm-6.3-007/sr_port/mu_dwngrd_header.c:81:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v15_csd->now_running, gtm_release_name, gtm_release_name_len + 1); /* GT.M release name */ data/fis-gtm-6.3-007/sr_port/mu_dwngrd_header.c:158:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v15_csd->jnl_file_name, csd->jnl_file_name, JNL_NAME_SIZE); data/fis-gtm-6.3-007/sr_port/mu_dwngrd_header.c:163:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v15_csd->reorg_restart_key, csd->reorg_restart_key, SIZEOF(csd->reorg_restart_key)); data/fis-gtm-6.3-007/sr_port/mu_dwngrd_header.c:164:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v15_csd->machine_name, csd->machine_name, MAX_MCNAMELEN); data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c:120:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(beg_gv_currkey->base, gv_currkey->base, (SIZEOF(gv_key) + gv_currkey->end)); data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c:215:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(encrypted_bp, bp, SIZEOF(blk_hdr)); data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c:280:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(beg_gv_currkey->base, gv_currkey->base, gv_currkey->end + 1); data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c:337:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zwr_buffer, key_buffer, fmtd_key_len); data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c:338:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zwr_buffer + fmtd_key_len, "=", 1); data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c:105:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, bp, bsiz); data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c:123:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(encr_ptr, (sm_uc_ptr_t)encrypted_bp, bsiz); data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c:134:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(encr_ptr, (sm_uc_ptr_t)encrypted_bp, bsiz); data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c:153:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_target->hist.h, rt_history->h, SIZEOF(srch_blk_status) * (rt_history->depth + 1)); data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c:166:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(private_blk, ptr, SIZEOF(blk_hdr)); data/fis-gtm-6.3-007/sr_port/mu_freeze_ch.c:47:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!gv_cur_region->open) data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:52:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF unsigned char muint_temp_buff[MAX_MIDENT_LEN + 1]; data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:191:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_KEY_SZ + 1], old_buff[MAX_KEY_SZ + 1], temp_buff[MAX_MIDENT_LEN + 1], util_buff[MAX_UTIL_SIZE]; data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:315:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, bot_key, bot_len); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:418:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trees->key, key_base, name_len); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:471:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(old_buff, buff, comp_length); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:472:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff + rec_cmpc, key_base, key_size); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:610:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&check_vals, &buff[b_index], 1); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:626:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&check_vals, &buff[b_index], 1); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:728:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sndata->span_node_buf, buff, buff_length); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:743:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sndata->span_node_buf, buff, buff_length); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:799:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sndata->span_node_buf, buff, buff_length); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:937:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(muint_temp_buff, temp_buff, SIZEOF(temp_buff)); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:960:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trees_tail->path, mu_int_path, SIZEOF(block_id) * (MAX_BT_DEPTH + 1)); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:961:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trees_tail->offset, mu_int_offset, SIZEOF(uint4) * (MAX_BT_DEPTH + 1)); data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:963:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trees_tail->key, muint_temp_buff, SIZEOF(muint_temp_buff)); data/fis-gtm-6.3-007/sr_port/mu_int_err.c:72:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/mu_int_err.c:73:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char span_key[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/mu_int_err.c:75:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char key_buffer[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/mu_int_getkey.c:44:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *top, *startsrc, *src, *dest, slit[MAX_KEY_SZ + 1], *tmp; data/fis-gtm-6.3-007/sr_port/mu_int_init.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgbuff[MSGBUF_SIZE], *msgptr; data/fis-gtm-6.3-007/sr_port/mu_int_init.c:108:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mu_int_data, (TREF(dio_buff)).aligned, SGMNT_HDR_LEN); data/fis-gtm-6.3-007/sr_port/mu_int_init.c:143:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mu_int_master, (TREF(dio_buff)).aligned, mu_int_data.master_map_len); data/fis-gtm-6.3-007/sr_port/mu_int_reg.c:179:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&mu_int_data, (uchar_ptr_t)csd, SIZEOF(sgmnt_data)); data/fis-gtm-6.3-007/sr_port/mu_int_reg.c:182:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mu_int_master, MM_ADDR(csd), MASTER_MAP_SIZE(csd)); data/fis-gtm-6.3-007/sr_port/mu_int_write.c:91:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pvt_crypt_buf.addr, ptr, SIZEOF(blk_hdr)); data/fis-gtm-6.3-007/sr_port/mu_int_write.c:119:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dio_buff)).aligned, write_buff, orig_write_len); data/fis-gtm-6.3-007/sr_port/mu_interactive.c:32:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char res[8]; data/fis-gtm-6.3-007/sr_port/mu_reduce_level.c:75:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_blk, old_blk_base + SIZEOF(blk_hdr), old_blk_sz - SIZEOF(blk_hdr)); data/fis-gtm-6.3-007/sr_port/mu_reorg.c:107:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cs_data->reorg_restart_key[0], &gv_currkey->base[0], gv_currkey->end + 1); \ data/fis-gtm-6.3-007/sr_port/mu_reorg.c:111:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cs_data->reorg_restart_key[0], &gv_currkey->base[0], OLD_MAX_KEY_SZ + 1); \ data/fis-gtm-6.3-007/sr_port/mu_reorg.c:262:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, cs_data->reorg_restart_key, tkeysize); data/fis-gtm-6.3-007/sr_port/mu_reorg.c:272:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_currkey->base[0], gn->addr, gn->len); data/fis-gtm-6.3-007/sr_port/mu_reorg.c:279:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_currkey->base[0], gn->addr, gn->len); data/fis-gtm-6.3-007/sr_port/mu_reorg.c:284:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_currkey_next_reorg->base[0], &gv_currkey->base[0], gv_currkey->end + 1); data/fis-gtm-6.3-007/sr_port/mu_reorg.c:485:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(gv_currkey_next_reorg->base[0]), rtsib_hist->h[0].buffaddr data/fis-gtm-6.3-007/sr_port/mu_reorg.c:626:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_currkey->base[0], &gv_currkey_next_reorg->base[0], gv_currkey_next_reorg->end + 1); data/fis-gtm-6.3-007/sr_port/mu_reorg.c:633:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_currkey->base[0], gn->addr, gn->len); data/fis-gtm-6.3-007/sr_port/mu_reorg_upgrd_dwngrd.c:82:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/mu_reorg_upgrd_dwngrd.c:376:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bml_lcl_buff, (blk_hdr_ptr_t)bml_sm_buff, BM_SIZE(BLKS_PER_LMAP)); data/fis-gtm-6.3-007/sr_port/mu_split.c:80:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char curr_prev_key[MAX_KEY_SZ+1], new_blk1_last_key[MAX_KEY_SZ+1]; data/fis-gtm-6.3-007/sr_port/mu_split.c:153:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newblk2_first_key, &new_blk1_last_key[0], tkeycmpc); /* copy the compressed key piece */ data/fis-gtm-6.3-007/sr_port/mu_split.c:196:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bn_ptr1, old_blk1_base + new_leftblk_top_off - SIZEOF(block_id), SIZEOF(block_id)); data/fis-gtm-6.3-007/sr_port/mu_split.c:218:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_ins_key, &new_blk1_last_key[0], new_blk1_last_keysz); data/fis-gtm-6.3-007/sr_port/mu_split.c:271:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ances_currkey, &curr_prev_key[0], old_ances_currkeycmpc); data/fis-gtm-6.3-007/sr_port/mu_split.c:275:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ances_currkey + old_ances_currkeycmpc, key_base, old_ances_currkeylen); data/fis-gtm-6.3-007/sr_port/mu_split.c:334:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newblk2_first_key, &new_blk1_last_key[0], tkeycmpc); /* compressed piece */ data/fis-gtm-6.3-007/sr_port/mu_split.c:415:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bn_ptr1, old_blk1_base + old_blk1_hist_ptr->curr_rec.offset + data/fis-gtm-6.3-007/sr_port/mu_split.c:479:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_blk_piece, old_blk_after_currec, save_blk_piece_len); data/fis-gtm-6.3-007/sr_port/mu_split.c:484:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bn_ptr2, new_blk1_top - SIZEOF(block_id), SIZEOF(block_id)); data/fis-gtm-6.3-007/sr_port/mu_split.c:511:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bn_ptr2, new_blk2_top - SIZEOF(block_id), SIZEOF(block_id)); data/fis-gtm-6.3-007/sr_port/mu_split.c:525:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_blk_piece, new_blk2_rem, save_blk_piece_len); data/fis-gtm-6.3-007/sr_port/mu_split.c:549:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_blk_piece, old_blk1_base + SIZEOF(blk_hdr), save_blk_piece_len); data/fis-gtm-6.3-007/sr_port/mu_split.c:553:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bn_ptr2, old_blk1_base + new_leftblk_top_off - SIZEOF(block_id), SIZEOF(block_id)); data/fis-gtm-6.3-007/sr_port/mu_split.c:581:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_blk_piece, new_blk2_rem, save_blk_piece_len); data/fis-gtm-6.3-007/sr_port/mu_split.c:602:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_blk_piece, old_blk_after_currec, save_blk_piece_len); data/fis-gtm-6.3-007/sr_port/mu_split.c:615:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_ins_key, &new_blk1_last_key[0], new_blk1_last_keysz); data/fis-gtm-6.3-007/sr_port/mu_split.c:646:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_currkey_next_reorg->base[0], next_gv_currkey, next_gv_currkeysz); data/fis-gtm-6.3-007/sr_port/mu_swap_blk.c:264:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&((TREF(gv_reorgkey))->base[0]), rec_base + SIZEOF(rec_hdr), key_len_dir); data/fis-gtm-6.3-007/sr_port/mu_swap_blk.c:306:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&((TREF(gv_reorgkey))->base[0]), rec_base + SIZEOF(rec_hdr), key_len); data/fis-gtm-6.3-007/sr_port/mu_swap_blk.c:377:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(saved_blk, dest_parent_ptr, dest_parent_size); data/fis-gtm-6.3-007/sr_port/mu_swap_blk.c:405:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(saved_blk, work_blk_ptr, work_blk_size); data/fis-gtm-6.3-007/sr_port/mu_upgrd_header.c:87:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csd->now_running, gtm_release_name, gtm_release_name_len + 1); /* GT.M release name */ data/fis-gtm-6.3-007/sr_port/mu_upgrd_header.c:217:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csd->jnl_file_name, v15_csd->jnl_file_name, JNL_NAME_SIZE); data/fis-gtm-6.3-007/sr_port/mu_upgrd_header.c:224:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csd->reorg_restart_key, v15_csd->reorg_restart_key, SIZEOF(csd->reorg_restart_key)); /* New from V4.2 */ data/fis-gtm-6.3-007/sr_port/mu_upgrd_header.c:225:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csd->machine_name, v15_csd->machine_name, MAX_MCNAMELEN); data/fis-gtm-6.3-007/sr_port/mubclnup.c:157:35: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). && jnlpool->jnlpool_dummy_reg->open) data/fis-gtm-6.3-007/sr_port/mucregini.c:276:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(baseDBreg->open); data/fis-gtm-6.3-007/sr_port/muextr.h:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gbl_name_buff[MAX_MIDENT_LEN + 2 + SPANREG_REGION_LITLEN + MAX_RN_LEN + 1]; \ data/fis-gtm-6.3-007/sr_port/muextr.h:39:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gbl_name_buff[1], GNAME(GL_PTR).addr, GNAME(GL_PTR).len); \ data/fis-gtm-6.3-007/sr_port/muextr.h:45:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gbl_name_buff[gbl_buff_index], gl_ptr->reg->rname, gl_ptr->reg->rname_len); \ data/fis-gtm-6.3-007/sr_port/mupfndfil.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_FN_LEN]; data/fis-gtm-6.3-007/sr_port/mupfndfil.c:86:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reg->dyn.addr->fname, retptr->addr, retptr->len + 1); data/fis-gtm-6.3-007/sr_port/mupint.h:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_MIDENT_LEN + 1]; /* max key length plus one for printf terminator */ data/fis-gtm-6.3-007/sr_port/mupint.h:70:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char span_node_buf[MAX_KEY_SZ]; /* Spanning node key */ data/fis-gtm-6.3-007/sr_port/mupip_backup.c:233:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char since_buff[50]; data/fis-gtm-6.3-007/sr_port/mupip_backup.c:236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempdir_trans_buffer[MAX_TRANS_NAME_LEN], data/fis-gtm-6.3-007/sr_port/mupip_backup.c:238:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *jnl_str_ptr, jnl_str[256], entry[256], prev_jnl_fn[JNL_NAME_SIZE]; data/fis-gtm-6.3-007/sr_port/mupip_backup.c:254:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *errptr, scndry_msg[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_port/mupip_backup.c:261:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char command[(STR_LIT_LEN(UNALIAS)) + (GTM_PATH_MAX) * 2 + 5]; data/fis-gtm-6.3-007/sr_port/mupip_backup.c:262:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cp_cmd[MAX_FN_LEN] = "cp "; data/fis-gtm-6.3-007/sr_port/mupip_backup.c:275:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */ data/fis-gtm-6.3-007/sr_port/mupip_backup.c:572:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tempnam_prefix, gv_cur_region->rname, gv_cur_region->rname_len); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:582:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tempdir_trans_buffer, SCRATCH_DIR, tempdir_trans.len); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:595:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tempdir_trans_buffer, rptr->backup_file.addr, tempdir_trans.len); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:681:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rptr->backup_tempfile[0], tempdir_full.addr, tempdir_full.len); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:779:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)seg->fname, replpool_id.instfilename, full_len); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:786:41: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(!jnlpool->jnlpool_dummy_reg->open); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1044:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmdptr, cp_cmd, STRLEN(cp_cmd)); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1046:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmdptr, seg->fname, seg->fname_len); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1049:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmdptr, mu_repl_inst_reg_list->backup_file.addr, mu_repl_inst_reg_list->backup_file.len); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1180:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rptr->backup_hdr, cs_data, SIZEOF_FILE_HDR(cs_data)); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1189:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sbufh_p->shadow_file_header, cs_data, SGMNT_HDR_LEN); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1307:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cs_data->jnl_file_name, jnl_info.jnl, jnl_info.jnl_len); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1375:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(sbufh_p->tempfilename[0]), &(rptr->backup_tempfile[0]), data/fis-gtm-6.3-007/sr_port/mupip_create.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_RN_LEN + 1], create_stat, exit_stat; data/fis-gtm-6.3-007/sr_port/mupip_downgrade.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char db_fn[MAX_FN_LEN + 1], ver_spec[MAX_VERSION_LEN + 1], data/fis-gtm-6.3-007/sr_port/mupip_downgrade.c:101:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char new_master_map[MASTER_MAP_SIZE_V4]; data/fis-gtm-6.3-007/sr_port/mupip_downgrade.c:357:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v15_csd.master_map, new_master_map, MASTER_MAP_SIZE_V4); data/fis-gtm-6.3-007/sr_port/mupip_downgrade.c:390:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dwngrd_ver + dwngrd_ver_len, ver_spec, ver_spec_len); data/fis-gtm-6.3-007/sr_port/mupip_extend.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char regionname[MAX_RN_LEN]; data/fis-gtm-6.3-007/sr_port/mupip_freeze.c:243:32: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (record && gv_cur_region->open) data/fis-gtm-6.3-007/sr_port/mupip_freeze.c:284:32: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (FALSE == gv_cur_region->open) data/fis-gtm-6.3-007/sr_port/mupip_integ.c:177:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *temp, util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/mupip_integ.c:179:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char key_buff[2048]; data/fis-gtm-6.3-007/sr_port/mupip_integ.c:194:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ss_filename[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_port/mupip_integ.c:543:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_altkey->base, trees->key, gv_altkey->end); data/fis-gtm-6.3-007/sr_port/mupip_integ.c:661:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "!/Free blocks counter in file header: ", util_len); data/fis-gtm-6.3-007/sr_port/mupip_integ.c:867:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dio_buff)).aligned, &mu_int_data, SGMNT_HDR_LEN); data/fis-gtm-6.3-007/sr_port/mupip_recover.c:169:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char histdetail[HIST_LEN]; data/fis-gtm-6.3-007/sr_port/mupip_reorg.c:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cli_buff[MAX_LINE], *ptr; data/fis-gtm-6.3-007/sr_port/mupip_reorg.c:261:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(gbuff_limit)).str.addr, REORG_GBUFF_LIMIT, SIZEOF(REORG_GBUFF_LIMIT)); data/fis-gtm-6.3-007/sr_port/mupip_set.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char db_fn[MAX_FN_LEN + 1], jnl_fn[JNL_NAME_SIZE + 1]; data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JNL_NAME_SIZE], full_buf[GTM_PATH_MAX], prev_buf[JNL_NAME_SIZE]; data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:58:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jnl_fn[JNL_NAME_SIZE]; data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:67:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)gv_cur_region->dyn.addr->fname, header->data_file_name, header->data_file_name_length); data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:106:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prev_buf, header->prev_jnl_file_name, prev_buf_len); data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:110:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prev_buf, "NULL", prev_buf_len); data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:119:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header->prev_jnl_file_name, full_buf, full_buf_len); data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:129:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prev_buf, "NULL", prev_buf_len); data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:133:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prev_buf, header->prev_jnl_file_name, prev_buf_len); data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:160:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prev_buf, header->data_file_name, prev_buf_len); data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:161:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header->data_file_name, full_buf, full_buf_len); data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:104:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tmp_full_jnl_fn[MAX_FN_LEN + 1], prev_jnl_fn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *db_reg_name, db_or_reg[DB_OR_REG_SIZE]; data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[JNLBUFFUPDAPNDX_SIZE]; /* JNLBUFFUPDAPNDX_SIZE is defined in jnl.h */ data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:197:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seg->fname, db_fn, db_fn_len); data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:321:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csd, (TREF(dio_buff)).aligned, SGMNT_HDR_LEN); data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:533:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnl_info.jnl, tmpjnlfile.addr, tmpjnlfile.len); data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:727:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prev_jnl_fn, csd->jnl_file_name, jnl_info.prev_jnl_len); data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:791:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csd->jnl_file_name, jnl_info.jnl, jnl_info.jnl_len); data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:833:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dio_buff)).aligned, csd, SGMNT_HDR_LEN); data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ext_name[MAX_FN_LEN], *ctop; data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:58:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnl_info->jnl, jnl_info->fn, jnl_info->fn_len); data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:69:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ext_name, ctop + 1, ext_name_len); data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:79:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnl_info->jnl, gds_info->nam->nam$l_esa, jnl_info->jnl_len); data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:81:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ext_name, gds_info->nam->nam$l_esa + jnl_info->jnl_len + 1, ext_name_len); data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:88:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnl_info->jnl + jnl_info->jnl_len, ext_name, ext_name_len); data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:95:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnl_info->jnl, csd->jnl_file_name, csd->jnl_file_len); data/fis-gtm-6.3-007/sr_port/mupip_upgrade.c:88:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char db_fn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/mupip_upgrade.c:99:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char new_v5_master_map[MASTER_MAP_SIZE_DFLT - MASTER_MAP_SIZE_V5_OLD]; data/fis-gtm-6.3-007/sr_port/mupip_upgrade.c:102:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char new_master_map[MASTER_MAP_SIZE_V4]; data/fis-gtm-6.3-007/sr_port/mupip_upgrade.c:304:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_master_map, v15_csd.master_map, MASTER_MAP_SIZE_V4); data/fis-gtm-6.3-007/sr_port/mupipbckup.h:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char backup_tempfile[256]; data/fis-gtm-6.3-007/sr_port/muprec.h:78:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(murgbl.extr_buff + extract_len, jrt_label[rec->prefix.jrec_type], LAB_LEN); \ data/fis-gtm-6.3-007/sr_port/muprec.h:80:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(murgbl.extr_buff + extract_len, LAB_TERM, LAB_TERM_SZ); \ data/fis-gtm-6.3-007/sr_port/muprec.h:87:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&murgbl.extr_buff[extract_len], T, actual); \ data/fis-gtm-6.3-007/sr_port/muprec.h:107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; \ data/fis-gtm-6.3-007/sr_port/muprec.h:260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[1024]; \ data/fis-gtm-6.3-007/sr_port/muprec.h:468:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char jnl_fn[JNL_NAME_SIZE]; /* Journal file name */ data/fis-gtm-6.3-007/sr_port/muprec.h:716:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *extr_fn[TOT_EXTR_TYPES]; data/fis-gtm-6.3-007/sr_port/muprec.h:764:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/muprec.h:1126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strbuff[256], *ptr; \ data/fis-gtm-6.3-007/sr_port/muprec.h:1127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */ \ data/fis-gtm-6.3-007/sr_port/muprec.h:1149:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, time_str, CTIME_BEFORE_NL); \ data/fis-gtm-6.3-007/sr_port/mur_apply_pblk.c:440:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, pblkcontents, fbw_size); data/fis-gtm-6.3-007/sr_port/mur_back_process.c:620:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[TRANS_OR_SEQ_NUM_CONT_CHK_FAILED_SZ]; /* for appending sequence or transaction number */ data/fis-gtm-6.3-007/sr_port/mur_close_files.c:122:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *head_jnl_fn, *rename_fn, fn[MAX_FN_LEN + STR_LIT_LEN(PREFIX_ROLLED_BAK) + 1]; data/fis-gtm-6.3-007/sr_port/mur_close_files.c:135:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ipcs_buff[MAX_IPCS_ID_BUF], *ipcs_ptr; data/fis-gtm-6.3-007/sr_port/mur_close_files.c:235:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open) data/fis-gtm-6.3-007/sr_port/mur_close_files.c:460:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(head_jnl_fn, jctl->jnl_fn, head_jnl_fn_len); data/fis-gtm-6.3-007/sr_port/mur_close_files.c:467:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jctl->jnl_fn, csd->jnl_file_name, jctl->jnl_fn_len); data/fis-gtm-6.3-007/sr_port/mur_close_files.c:498:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jctl->jnl_fn, jctl->jfh->prev_jnl_file_name, jctl->jnl_fn_len); data/fis-gtm-6.3-007/sr_port/mur_close_files.c:710:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnlpool->jnlpool_ctl->strm_seqno, inst_hdr->strm_seqno, data/fis-gtm-6.3-007/sr_port/mur_close_files.c:787:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open) data/fis-gtm-6.3-007/sr_port/mur_db_files_from_jnllist.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *cptr, *ctop, *cptr_last, db_fname[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_port/mur_db_files_from_jnllist.c:97:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seg->fname, &db_fname[0], db_fname_len); data/fis-gtm-6.3-007/sr_port/mur_db_files_from_jnllist.c:156:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seg->fname, jfh->data_file_name, seg->fname_len); data/fis-gtm-6.3-007/sr_port/mur_forward.c:199:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[256]; data/fis-gtm-6.3-007/sr_port/mur_forward.c:343:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(!rctl->gd->open); data/fis-gtm-6.3-007/sr_port/mur_forward.c:355:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(!reg->open || (NULL != cs_addrs->dir_tree)); data/fis-gtm-6.3-007/sr_port/mur_forward_play_cur_jrec.c:283:48: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(!mur_options.update || (gv_cur_region->open && (NULL != rctl->csa))); data/fis-gtm-6.3-007/sr_port/mur_forward_play_cur_jrec.c:288:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, &keystr->text[0], keystr->length); data/fis-gtm-6.3-007/sr_port/mur_forward_play_cur_jrec.c:291:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (gv_cur_region->open) data/fis-gtm-6.3-007/sr_port/mur_forward_play_cur_jrec.c:302:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(gv_cur_region->open); data/fis-gtm-6.3-007/sr_port/mur_forward_play_multireg_tp.c:150:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tcom_record.jnl_tid, rec->jrec_tcom.jnl_tid, TID_STR_SIZE); data/fis-gtm-6.3-007/sr_port/mur_gbldefs.c:45:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF char first_zerobit_position[256] = { /* 0x0 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xA 0xB 0xC 0xD 0xE 0xF */ data/fis-gtm-6.3-007/sr_port/mur_get_options.c:349:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(file_name_specified, entry, file_name_specified_len); data/fis-gtm-6.3-007/sr_port/mur_get_options.c:372:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rl_ptr->org_name, file_name_expanded, rl_ptr->org_name_len); data/fis-gtm-6.3-007/sr_port/mur_get_options.c:382:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(file_name_specified, entry_ptr, file_name_specified_len); data/fis-gtm-6.3-007/sr_port/mur_get_options.c:405:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rl_ptr->new_name, file_name_expanded, rl_ptr->new_name_len); data/fis-gtm-6.3-007/sr_port/mur_get_options.c:562:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sl_ptr->buff, entry_ptr, length); data/fis-gtm-6.3-007/sr_port/mur_get_options.c:636:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sl_ptr->buff, entry_ptr, length); data/fis-gtm-6.3-007/sr_port/mur_get_pini.c:129:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&plst->jpv, &pinirec->process_vector[CURR_JPV], SIZEOF(jnl_process_vector)); data/fis-gtm-6.3-007/sr_port/mur_get_pini.c:130:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&plst->origjpv, &pinirec->process_vector[ORIG_JPV], SIZEOF(jnl_process_vector)); data/fis-gtm-6.3-007/sr_port/mur_init.c:43:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/mur_insert_prev.c:60:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_jctl->jnl_fn, jctl->jfh->prev_jnl_file_name, jctl->jfh->prev_jnl_file_name_length); data/fis-gtm-6.3-007/sr_port/mur_jctl_from_next_gen.c:72:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(temp_jctl->jnl_fn, jctl->jfh->next_jnl_file_name, jctl->jfh->next_jnl_file_name_length); data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:47:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char *jrt_label[JRT_RECTYPES]; data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:89:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(murgbl.extr_buff + extract_len, "TSTART \\"); data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:93:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(murgbl.extr_buff + extract_len, "ZTSTART\\"); data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:138:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(murgbl.extr_buff, " ", 23); data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:142:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(murgbl.extr_buff + extract_len, " \\"); data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:143:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(murgbl.extr_buff + extract_len, jrt_label[rectype], LAB_LEN); data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:145:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(murgbl.extr_buff + extract_len, LAB_TERM, LAB_TERM_SZ); data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:275:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char*)&pblk_head, (char*)&rec->jrec_pblk.blk_contents[0], SIZEOF(blk_hdr)); data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:268:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *buff, extr_fn[MAX_FN_LEN + 1], *fn, *fn_out; data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rename_fn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[1024]; data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:341:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(file_info->fn, mur_shm_hdr->extr_fn[recstat].fn, mur_shm_hdr->extr_fn_len[recstat]); data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:354:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, reg->rname, reg->rname_len); data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:483:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fn_out, fn, extr_fn_len); data/fis-gtm-6.3-007/sr_port/mur_open_files.c:272:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char jnl_file_list[MAX_LINE]; data/fis-gtm-6.3-007/sr_port/mur_open_files.c:296:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */ data/fis-gtm-6.3-007/sr_port/mur_open_files.c:416:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curr->gd->dyn.addr->fname, rl_ptr->new_name, curr->gd->dyn.addr->fname_len); data/fis-gtm-6.3-007/sr_port/mur_open_files.c:529:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(rctl->gd->open); /* region should have been opened by now */ data/fis-gtm-6.3-007/sr_port/mur_open_files.c:884:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jctl->jnl_fn, csd->jnl_file_name, csd->jnl_file_len); data/fis-gtm-6.3-007/sr_port/mur_output_record.c:318:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tcom_record.jnl_tid, rec->jrec_tcom.jnl_tid, TID_STR_SIZE); data/fis-gtm-6.3-007/sr_port/mur_output_show.c:44:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char *jrt_label[JRT_RECTYPES]; data/fis-gtm-6.3-007/sr_port/mur_output_show.c:99:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jpv_time_str[LENGTH_OF_TIME + 1]; data/fis-gtm-6.3-007/sr_port/mur_output_show.c:118:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[LENGTH_OF_TIME + 1]; data/fis-gtm-6.3-007/sr_port/mur_output_show.c:119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outbuf[GTMCRYPT_HASH_HEX_LEN + 1]; data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prev_jnl_fn[MAX_FN_LEN + 1], rename_fn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c:276:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jctl->jnl_fn, rename_fn, rename_fn_len + 1); data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c:308:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jfh->next_jnl_file_name, jctl->next_gen->jnl_fn, jctl->next_gen->jnl_fn_len); data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c:365:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnl_info.prev_jnl, rctl->jctl_turn_around->jnl_fn, rctl->jctl_turn_around->jnl_fn_len); data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c:368:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnl_info.jnl, rctl->csd->jnl_file_name, jnl_info.jnl_len); data/fis-gtm-6.3-007/sr_port/mur_process_seqno_table.c:42:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char first_zerobit_position[256]; data/fis-gtm-6.3-007/sr_port/mur_process_timequal.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str1[LENGTH_OF_TIME + 1], time_str2[LENGTH_OF_TIME + 1]; data/fis-gtm-6.3-007/sr_port/mur_read_file.c:338:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mur_desc->seq_buff[1].top, mur_desc->seq_buff[0].base, partial_reclen); data/fis-gtm-6.3-007/sr_port/mur_read_file.c:531:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mur_desc->seq_buff[0].base - partial_reclen, (char *)prefix, partial_reclen); data/fis-gtm-6.3-007/sr_port/mur_read_file.c:941:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jrecbuf[PINI_RECLEN + EPOCH_RECLEN + PFIN_RECLEN + EOF_RECLEN]; data/fis-gtm-6.3-007/sr_port/mur_select_rec.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_buff[MAX_KEY_SZ + 1 + SIZEOF(uint4) * 2], asc_key_buff[MAX_ZWR_KEY_SZ], *ptr; data/fis-gtm-6.3-007/sr_port/mur_select_rec.c:82:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key->base, &keystr->text[0], keystr->length); data/fis-gtm-6.3-007/sr_port/mur_write_header_extfmt.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[1024]; data/fis-gtm-6.3-007/sr_port/mur_write_header_extfmt.c:72:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&murgbl.extr_buff[extrlen], ptr, tmplen); data/fis-gtm-6.3-007/sr_port/mur_write_header_extfmt.c:83:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&murgbl.extr_buff[extrlen], ptr, tmplen); data/fis-gtm-6.3-007/sr_port/mur_write_header_extfmt.c:94:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&murgbl.extr_buff[extrlen], ptr, tmplen); data/fis-gtm-6.3-007/sr_port/murest.h:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[INC_HDR_LABEL_SZ]; data/fis-gtm-6.3-007/sr_port/murest.h:28:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char date[INC_HDR_DATE_SZ]; data/fis-gtm-6.3-007/sr_port/murest.h:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reg[MAX_RN_LEN]; data/fis-gtm-6.3-007/sr_port/murest.h:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encryption_hash[GTMCRYPT_RESERVED_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/murest.h:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encryption_hash2[GTMCRYPT_RESERVED_HASH_LEN]; data/fis-gtm-6.3-007/sr_port/mutex_deadlock_check.c:101:81: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(!jnlpool || !jnlpool->jnlpool_dummy_reg || jnlpool->jnlpool_dummy_reg->open data/fis-gtm-6.3-007/sr_port/mutex_deadlock_check.c:130:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!tr->reg->open) data/fis-gtm-6.3-007/sr_port/mval2fao.c:75:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, (fao)->str.addr, (fao)->str.len); data/fis-gtm-6.3-007/sr_port/mval2fao.c:97:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, (fao)->str.addr, (fao)->str.len); data/fis-gtm-6.3-007/sr_port/mval2subsc.c:29:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char pos_code[100] = data/fis-gtm-6.3-007/sr_port/mval2subsc.c:43:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char neg_code[100] = data/fis-gtm-6.3-007/sr_port/mval2subsc.c:60:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf1[MAX_KEY_SZ + 1], ch, *cvt_table, *in_ptr, *out_ptr; data/fis-gtm-6.3-007/sr_port/mval2subsc.c:61:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *tm, temp_mantissa[NUM_DEC_DG_2L / 2 + 3]; /* Need 1 byte for each two digits. Add 3 bytes slop */ data/fis-gtm-6.3-007/sr_port/mval_nongraphic.c:21:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[10]; /* sufficient to hold all possible UTF8 code point values */ data/fis-gtm-6.3-007/sr_port/mvalconv.c:170:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFF_LEN]; /* [possible] sign, [up to] 19L/20UL digits, and terminator. */ data/fis-gtm-6.3-007/sr_port/mvalconv.c:214:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, buf, len); data/fis-gtm-6.3-007/sr_port/mvalconv.c:261:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFF_LEN]; /* The maximum-length value in the 'F' representation would look like -0.123457 (that is, data/fis-gtm-6.3-007/sr_port/mvalconv.c:280:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFF_LEN]; /* The maximum-length value in the 'F' representation would look like -0.123456789012345 data/fis-gtm-6.3-007/sr_port/n2s.c:28:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char lcl_buf[MAX_DIGITS_IN_INT]; data/fis-gtm-6.3-007/sr_port/n2s.c:76:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, cp1, n0); data/fis-gtm-6.3-007/sr_port/namelook.c:25:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char temp[NAME_ENTRY_SZ], x; data/fis-gtm-6.3-007/sr_port/nametabtyp.h:17:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[NAME_ENTRY_SZ]; data/fis-gtm-6.3-007/sr_port/one_job_param.c:42:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const static readonly unsigned char job_param_index[27] = data/fis-gtm-6.3-007/sr_port/one_job_param.c:51:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const static readonly unsigned char job_param_index[27] = data/fis-gtm-6.3-007/sr_port/one_job_param.c:133:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*parptr, (TREF(window_mval)).str.addr, len); data/fis-gtm-6.3-007/sr_port/op_bindparm.c:134:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vname.c, tabent->key.var_name.addr, tabent->key.var_name.len); data/fis-gtm-6.3-007/sr_port/op_break.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_ENTRYREF_LEN]; data/fis-gtm-6.3-007/sr_port/op_break.c:66:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(line, line_start, MIN(line_length, SIZEOF(line))); data/fis-gtm-6.3-007/sr_port/op_cat.c:74:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, in->str.addr, in->str.len); data/fis-gtm-6.3-007/sr_port/op_close.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_TRANS_NAME_LEN]; /* buffer to hold translated name */ data/fis-gtm-6.3-007/sr_port/op_exp.c:49:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(u1_p, u, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_fnfnumber.c:146:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, ch, 3); data/fis-gtm-6.3-007/sr_port/op_fnfnumber.c:151:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, ch, xx); data/fis-gtm-6.3-007/sr_port/op_fnfnumber.c:156:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, ch, ct); data/fis-gtm-6.3-007/sr_port/op_fnincr.c:29:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port/op_fnj2.c:51:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp + n, src->str.addr, src->str.len); data/fis-gtm-6.3-007/sr_port/op_fnj2.c:78:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp + n, src->str.addr, src->str.len); data/fis-gtm-6.3-007/sr_port/op_fnlvname.c:67:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, min->key.var_name.addr, n); data/fis-gtm-6.3-007/sr_port/op_fnlvprvname.c:64:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, max->key.var_name.addr, n); data/fis-gtm-6.3-007/sr_port/op_fnname.c:65:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, arg->str.addr, arg->str.len); \ data/fis-gtm-6.3-007/sr_port/op_fnname.c:235:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, arg->str.addr, arg->str.len); data/fis-gtm-6.3-007/sr_port/op_fnquery.c:279:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, varname->str.addr, varname->str.len); data/fis-gtm-6.3-007/sr_port/op_fnquery.c:346:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, v2->str.addr, v2->str.len); data/fis-gtm-6.3-007/sr_port/op_fnstack2.c:62:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char info_upper[SIZEOF("MCODE")]; data/fis-gtm-6.3-007/sr_port/op_fntext.c:130:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, &ret->str.addr[i], ret->str.len - i); data/fis-gtm-6.3-007/sr_port/op_fnview.c:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char instfilename[MAX_FN_LEN + 1 + 1]; /* 1 for possible flag character */ data/fis-gtm-6.3-007/sr_port/op_fnview.c:140:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/op_fnview.c:223:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!parmblk.gv_ptr->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:225:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(parmblk.gv_ptr->open); data/fis-gtm-6.3-007/sr_port/op_fnview.c:278:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!parmblk.gv_ptr->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:316:26: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!parmblk.gv_ptr->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:330:26: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!parmblk.gv_ptr->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:390:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:407:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:452:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:541:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!parmblk.gv_ptr->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:551:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!parmblk.gv_ptr->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:563:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!parmblk.gv_ptr->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:573:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!parmblk.gv_ptr->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:725:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!parmblk.gv_ptr->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:734:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!parmblk.gv_ptr->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:743:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!parmblk.gv_ptr->open) data/fis-gtm-6.3-007/sr_port/op_fnview.c:797:30: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(n = parmblk.gv_ptr->open)) data/fis-gtm-6.3-007/sr_port/op_fnzahandle.c:54:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_fnzatransform.c:90:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_KEY_SZ + 1], msrcbuff[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/op_fnzatransform.c:159:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msrcbuff, src->str.addr, src->str.len); data/fis-gtm-6.3-007/sr_port/op_fnzbitcoun.c:22:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char mask[8] = {128, 64, 32, 16, 8, 4, 2, 1}; data/fis-gtm-6.3-007/sr_port/op_fnzbitfind.c:21:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char mask[8] = {0x80,0x40,0x20,0x10,0x8,0x4,0x2,0x1}; data/fis-gtm-6.3-007/sr_port/op_fnzbitor.c:75:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(byte_n, short1 ? byte2_n : byte1_n, n - n0); data/fis-gtm-6.3-007/sr_port/op_fnzbitset.c:21:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char mask[8] = {1,128,64,32,16,8,4,2}; data/fis-gtm-6.3-007/sr_port/op_fnzbitset.c:45:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dist_byte, byte_1, bitstr->str.len); data/fis-gtm-6.3-007/sr_port/op_fnzbitstr.c:24:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char mask[8]={0xFF,0xFE,0xFC,0xF8,0xF0,0xE0,0xC0,0x80}; data/fis-gtm-6.3-007/sr_port/op_fnzbitxor.c:18:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char mask[8]={0xFF,0xFE,0xFC,0xF8,0xF0,0xE0,0xC0,0x80}; data/fis-gtm-6.3-007/sr_port/op_fnzcollate.c:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[MAX_TRANS_NAME_LEN]; /* buffer to hold translated name */ data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:282:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. dst->str.addr = (char *)zsocket_howcreated_names[socketptr->howcreated]; data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:439:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. dst->str.addr = (char *)zsocket_state_names[socketptr->state]; data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:486:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf1, TLSOPTIONLIT, len2); data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:487:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf1[len2], &charptr[optionoffset], optionlen); data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:526:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(charptr, ONE_COMMA, len); data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:538:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(charptr, tls_sock->tlsid, len); data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:548:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(charptr, conn_info.protocol, len2); data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:553:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(charptr, conn_info.session_algo, len2); data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:583:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(charptr, conn_info.session_id, len2); data/fis-gtm-6.3-007/sr_port/op_fnztrigger.c:97:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF unsigned char ztrprm_index[27] = data/fis-gtm-6.3-007/sr_port/op_fnztrigger.c:158:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/op_fnztrigger.c:265:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, (failed ? &literal_zero : &literal_one), SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_getindx.c:42:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[512], *end; data/fis-gtm-6.3-007/sr_port/op_gvextnam.c:118:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(extnam_str.addr, tmp_mstr_ptr->addr, tmp_mstr_ptr->len); data/fis-gtm-6.3-007/sr_port/op_gvincr.c:41:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port/op_gvkill.c:92:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (gv_cur_region->open) data/fis-gtm-6.3-007/sr_port/op_gvname.c:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char varstr[MAX_MIDENT_LEN + 1]; data/fis-gtm-6.3-007/sr_port/op_gvname.c:111:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(varstr, val->str.addr, gvname.var_name.len); data/fis-gtm-6.3-007/sr_port/op_gvorder.c:173:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!gv_cur_region->open) data/fis-gtm-6.3-007/sr_port/op_gvorder.c:265:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_currkey->base[0], map->gvkey.addr, gv_currkey->end); data/fis-gtm-6.3-007/sr_port/op_gvorder.c:282:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (stringpool.free, gvname.var_name.addr, gvname.var_name.len); data/fis-gtm-6.3-007/sr_port/op_gvput.c:46:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port/op_gvput.c:92:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (gv_cur_region->open && !gv_cur_region->read_only data/fis-gtm-6.3-007/sr_port/op_gvquery.c:37:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end, *glob_begin; data/fis-gtm-6.3-007/sr_port/op_gvquery.c:142:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(extnamdst, glob_begin, size); data/fis-gtm-6.3-007/sr_port/op_gvqueryget.c:62:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey, save_key, SIZEOF(*save_key) + save_key->end); data/fis-gtm-6.3-007/sr_port/op_gvrectarg.c:93:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gvsavtarg, c, GVSAVTARG_FIXED_SIZE); data/fis-gtm-6.3-007/sr_port/op_gvrectarg.c:141:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, c, end); data/fis-gtm-6.3-007/sr_port/op_gvsavtarg.c:106:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c, gv_currkey->base, end); data/fis-gtm-6.3-007/sr_port/op_gvzwithdraw.c:85:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (gv_cur_region->open) data/fis-gtm-6.3-007/sr_port/op_indname.c:37:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, target->str.addr, target->str.len); data/fis-gtm-6.3-007/sr_port/op_indname.c:52:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, subs->str.addr, subs->str.len); data/fis-gtm-6.3-007/sr_port/op_indtext.c:76:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, lab->str.addr, lab->str.len); data/fis-gtm-6.3-007/sr_port/op_indtext.c:82:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, rtn->str.addr, rtn->str.len); data/fis-gtm-6.3-007/sr_port/op_merge.c:103:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/op_merge.c:164:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mergekey2->base, gv_currkey->base, gv_currkey->end + 1); data/fis-gtm-6.3-007/sr_port/op_merge.c:260:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gblp2->s_gv_currkey->base + org_glvn2_keysz - 2, data/fis-gtm-6.3-007/sr_port/op_merge.c:309:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base + org_glvn1_keysz - 2, data/fis-gtm-6.3-007/sr_port/op_merge.c:417:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base + org_glvn2_keysz - 2, mkey->str.addr + org_glvn2_keysz - 2, delta2 + 2); data/fis-gtm-6.3-007/sr_port/op_merge_arg.c:75:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port/op_newvar.c:191:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vname.c, tabent->key.var_name.addr, tabent->key.var_name.len); data/fis-gtm-6.3-007/sr_port/op_open.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[MAX_TRANS_NAME_LEN]; /* buffer to hold translated name */ data/fis-gtm-6.3-007/sr_port/op_rdone.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *start_ptr,temp_buf[TMP_BUF_LEN]; data/fis-gtm-6.3-007/sr_port/op_rfrshlvn.c:47:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[512], *end; data/fis-gtm-6.3-007/sr_port/op_rhdaddr.c:32:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&BUFFER, (NEWMVAL)->str.addr, (NEWMVAL)->str.len); \ data/fis-gtm-6.3-007/sr_port/op_setalsin2alsct.c:59:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dstlv->v, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_setzbrk.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *cp, zbloc_buff[MAX_ENTRYREF_LEN], *zbloc_end; data/fis-gtm-6.3-007/sr_port/op_setzextract.c:88:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(straddr, pfx, pfxlen); data/fis-gtm-6.3-007/sr_port/op_setzextract.c:97:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(straddr, expr->str.addr, expr->str.len); data/fis-gtm-6.3-007/sr_port/op_setzextract.c:103:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(straddr, pfx + sfxoff, sfxlen); data/fis-gtm-6.3-007/sr_port/op_setzp1.c:232:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, src->str.addr, pfx_str_len); data/fis-gtm-6.3-007/sr_port/op_setzp1.c:241:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, expr->str.addr, expr->str.len); data/fis-gtm-6.3-007/sr_port/op_setzp1.c:247:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, start_pfx + sfx_start_offset, sfx_str_len); data/fis-gtm-6.3-007/sr_port/op_setzp1.c:277:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cfnpc->pstart[0], &pfnpc->pstart[0], (cfnpc->npcs + 1) * SIZEOF(unsigned int)); data/fis-gtm-6.3-007/sr_port/op_setzpiece.c:133:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, src->str.addr, first_src_ind); data/fis-gtm-6.3-007/sr_port/op_setzpiece.c:139:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, del->str.addr, del->str.len); data/fis-gtm-6.3-007/sr_port/op_setzpiece.c:143:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, expr->str.addr, expr->str.len); data/fis-gtm-6.3-007/sr_port/op_setzpiece.c:150:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, tmp_str, len); data/fis-gtm-6.3-007/sr_port/op_svget.c:187:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, (char *)tl->dollar_io, tl->len); data/fis-gtm-6.3-007/sr_port/op_svget.c:190:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, dollar_zpin.addr, dollar_zpin.len); data/fis-gtm-6.3-007/sr_port/op_svget.c:205:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, (char *)tl->dollar_io, tl->len); data/fis-gtm-6.3-007/sr_port/op_svget.c:208:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, dollar_zpout.addr, dollar_zpout.len); data/fis-gtm-6.3-007/sr_port/op_svget.c:496:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_svget.c:513:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, (NULL != dollar_ztdata) ? dollar_ztdata : &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_svget.c:522:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_svget.c:524:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, dollar_ztdelim, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_svget.c:535:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, (NULL != dollar_ztoldval) ? dollar_ztoldval : &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_svget.c:544:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, (NULL != dollar_ztriggerop) ? dollar_ztriggerop : &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_svget.c:554:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, ((NULL != dollar_ztupdate && (MV_STR & dollar_ztupdate->mvtype)) ? dollar_ztupdate data/fis-gtm-6.3-007/sr_port/op_svget.c:566:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, (NULL != dollar_ztvalue) ? dollar_ztvalue : &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_svget.c:578:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, mvp, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_svget.c:580:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_svget.c:592:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, mvp, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_svput.c:129:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dollar_zcompile)).addr, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_port/op_svput.c:178:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dollar_zroutines)).addr, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_port/op_svput.c:252:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(gtmprompt)).addr, v->str.addr, (TREF(gtmprompt)).len); data/fis-gtm-6.3-007/sr_port/op_svput.c:375:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dollar_ztvalue, v, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_svput.c:403:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)&dollar_ztslate, v, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_tcommit.c:92:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/op_tcommit.c:187:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port/op_trestart.c:31:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/op_trollback.c:125:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!curreg->open) data/fis-gtm-6.3-007/sr_port/op_tstart.c:79:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char *msp, *stacktop, *stackwarn, *tpstackbase, *tpstacktop, *tp_sp, t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/op_tstart.c:145:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tp_bat[TP_BATCH_LEN]; data/fis-gtm-6.3-007/sr_port/op_tstart.c:183:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (r_local->open && !r_local->was_open && IS_REG_BG_OR_MM(r_local)) data/fis-gtm-6.3-007/sr_port/op_tstart.c:213:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. GTMTRIG_ONLY(memcpy(&dollar_ztslate, &literal_null, SIZEOF(mval))); /* Zap $ZTSLate at start of lvl 1 trans */ data/fis-gtm-6.3-007/sr_port/op_tstart.c:295:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tcom_record.jnl_tid, (char *)tid->str.addr, tid->str.len); data/fis-gtm-6.3-007/sr_port/op_tstart.c:388:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mv_st_ent->mv_st_cont.mvs_tp_holder.ztwormhole_save, &dollar_ztwormhole, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/op_tstart.c:450:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, extnam_str.addr, len); data/fis-gtm-6.3-007/sr_port/op_use.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[MAX_TRANS_NAME_LEN]; /* buffer to hold translated name */ data/fis-gtm-6.3-007/sr_port/op_view.c:165:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chptr, label_type[SIZEOF("lower") - 1]; data/fis-gtm-6.3-007/sr_port/op_view.c:388:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/op_view.c:454:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TREF(view_ydirt_str), parmblk.value->str.addr, TREF(view_ydirt_str_len)); data/fis-gtm-6.3-007/sr_port/op_view.c:834:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lvmon_var_p->lvmv.var_name.addr, arg->str.addr, arg->str.len); data/fis-gtm-6.3-007/sr_port/op_view.c:917:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); /* taken care of by view_arg_convert */ data/fis-gtm-6.3-007/sr_port/op_wtone.c:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_ch[1]; data/fis-gtm-6.3-007/sr_port/op_wttab.c:19:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF unsigned char spaces_block[TAB_BUF_SZ] = data/fis-gtm-6.3-007/sr_port/op_wttab.c:30:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF unsigned char ebcdic_spaces_block[TAB_BUF_SZ] = data/fis-gtm-6.3-007/sr_port/op_zcompile.c:28:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ceprep_file[MAX_FN_LEN + 1], data/fis-gtm-6.3-007/sr_port/op_zgoto.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rtnname_buff[SIZEOF(mident_fixed)], lblname_buff[SIZEOF(mident_fixed)]; data/fis-gtm-6.3-007/sr_port/op_zgoto.c:85:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rtnname_buff, rtnname.str.addr, rtnname.str.len); data/fis-gtm-6.3-007/sr_port/op_zgoto.c:87:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lblname_buff, lblname.str.addr, lblname.str.len); data/fis-gtm-6.3-007/sr_port/op_zgoto.c:104:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rtnname_buff, rtnhdr->routine_name.addr, rtnhdr->routine_name.len); data/fis-gtm-6.3-007/sr_port/op_zprevious.c:182:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!gv_cur_region->open) data/fis-gtm-6.3-007/sr_port/op_zprevious.c:254:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, prev_map->gvkey.addr, gv_currkey->end); data/fis-gtm-6.3-007/sr_port/op_zprevious.c:271:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, gvname.var_name.addr, gvname.var_name.len); data/fis-gtm-6.3-007/sr_port/op_zsystem.c:87:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmd_buf, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_port/op_zsystem.c:119:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmd_buf, filtered_command.address, filtered_command.length); data/fis-gtm-6.3-007/sr_port/parm_pool.c:223:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pool_ptr->parms, (TREF(parm_pool_ptr))->parms, SIZEOF(lv_val *) * slots_copied * LV_VALS_PER_SLOT); data/fis-gtm-6.3-007/sr_port/parse_trctbl_groups.c:21:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF char *gtm_trcgrp_names[LAST_TRACE_GROUP + 1] = data/fis-gtm-6.3-007/sr_port/patcode.h:145:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[2]; /* must be last entity in structure */ data/fis-gtm-6.3-007/sr_port/patcode.h:187:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_PATTERN_LENGTH - 2]; data/fis-gtm-6.3-007/sr_port/patcode.h:269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[CHAR_CLASSES]; \ data/fis-gtm-6.3-007/sr_port/patstr.c:30:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char ctypetab[NUM_CHARS]; data/fis-gtm-6.3-007/sr_port/patstr.c:688:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(strlit.buff, &cur_alt->altpat.buff[PAT_MASK_BEGIN_OFFSET data/fis-gtm-6.3-007/sr_port/pattab.c:102:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char ident[MAXPATNAM + 1]; data/fis-gtm-6.3-007/sr_port/pattab.c:106:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char patline[MAXPATNAM + 2]; data/fis-gtm-6.3-007/sr_port/pattab.c:172:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_TRANS_NAME_LEN]; data/fis-gtm-6.3-007/sr_port/pattab.c:206:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char newtabnam[MAXPATNAM + 1], newYZnam[PAT_YZMAXNUM][PAT_YZMAXLEN]; data/fis-gtm-6.3-007/sr_port/pattab.c:233:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newtabnam, ident, newnamlen + 1); data/fis-gtm-6.3-007/sr_port/pattab.c:276:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newYZnam[newYZnum], ident, idlen); data/fis-gtm-6.3-007/sr_port/pattab.c:348:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newpat->name, newtabnam, newnamlen + 1); data/fis-gtm-6.3-007/sr_port/pattab.c:350:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newpat->typemask, newtable, max_patents * SIZEOF(typemask[0])); data/fis-gtm-6.3-007/sr_port/pattab.c:352:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newpat->patYZnam, newYZnam, SIZEOF(newYZnam)); data/fis-gtm-6.3-007/sr_port/pattab.c:354:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newpat->patYZlen, newYZlen, SIZEOF(newYZlen)); data/fis-gtm-6.3-007/sr_port/pattab.c:384:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name_copy, file_name, name_len); data/fis-gtm-6.3-007/sr_port/pattab.c:486:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ptnam[MAXPATNAM + 1]; data/fis-gtm-6.3-007/sr_port/pattab.c:492:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptnam, table_name->addr, table_name->len); data/fis-gtm-6.3-007/sr_port/preemptive_db_clnup.c:102:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open && !reg->was_open) data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *filename_begin, append_char[MAX_CHARS_APPEND] = {'0', '1', '2', '3', '4', '5', '6', '7', '8', '9'}; data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:70:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rename_fn, org_fn, length); data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:75:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rename_fn + length, prefix, prefix_len); data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:76:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rename_fn + length + prefix_len, org_fn, org_fn_len); data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:84:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rename_fn, org_fn, org_fn_len); data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:85:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rename_fn + org_fn_len, suffix, suffix_len); data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:105:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rename_fn, org_fn, org_fn_len); /* Copy original file name to "rename_fn" */ data/fis-gtm-6.3-007/sr_port/print_exit_stats.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pmap_buf[64]; data/fis-gtm-6.3-007/sr_port/print_exit_stats.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char systembuff[MAX_FN_LEN]; data/fis-gtm-6.3-007/sr_port/print_exit_stats.c:85:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmdptr, pmap_buf, STRLEN(pmap_buf)); data/fis-gtm-6.3-007/sr_port/print_target.c:33:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ + SIZEOF("?.0")]; data/fis-gtm-6.3-007/sr_port/process_deferred_stale.c:70:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (r_cur->open) data/fis-gtm-6.3-007/sr_port/process_gvt_pending_list.c:99:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(!reg->open); data/fis-gtm-6.3-007/sr_port/push_stck.c:38:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msp + mvs_size[MVST_STCK], val, val_size); data/fis-gtm-6.3-007/sr_port/put_cdlt.c:34:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str->addr, x->addr, x->len); data/fis-gtm-6.3-007/sr_port/put_str.c:27:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, pt, n); data/fis-gtm-6.3-007/sr_port/read_db_files_from_gld.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_FN_LEN]; data/fis-gtm-6.3-007/sr_port/read_db_files_from_gld.c:71:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seg->fname, filename, retptr->len + 1); data/fis-gtm-6.3-007/sr_port/region_freeze.c:106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */ data/fis-gtm-6.3-007/sr_port/region_init.c:47:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (gv_cur_region->open) data/fis-gtm-6.3-007/sr_port/region_init.c:57:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (gv_cur_region->open) data/fis-gtm-6.3-007/sr_port/region_init.c:78:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (baseDBreg->open) data/fis-gtm-6.3-007/sr_port/region_init.c:87:43: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (baseDBnl->statsdb_created && !reg->open) data/fis-gtm-6.3-007/sr_port/region_init.c:91:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_port/repl_comm.c:94:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char dl_err[MAX_ERRSTR_LEN]; data/fis-gtm-6.3-007/sr_port/repl_comm.c:129:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TRACE_BUFF, IO_BUFF + IO_SIZE - MAX_TRACE_SIZE, MAX_TRACE_SIZE); \ data/fis-gtm-6.3-007/sr_port/repl_comm.c:136:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TRACE_BUFF + TRACE_BUFF_POS, IO_BUFF, space_to_end); \ data/fis-gtm-6.3-007/sr_port/repl_comm.c:137:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TRACE_BUFF, IO_BUFF + space_to_end, IO_SIZE - space_to_end); \ data/fis-gtm-6.3-007/sr_port/repl_comm.c:139:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TRACE_BUFF + TRACE_BUFF_POS, IO_BUFF, IO_SIZE); \ data/fis-gtm-6.3-007/sr_port/repl_comm.c:483:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *errptr, local_ip[SA_MAXLEN], remote_ip[SA_MAXLEN]; data/fis-gtm-6.3-007/sr_port/repl_comm.c:484:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_port/repl_comm.c:485:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_port_buffer[NI_MAXSERV], remote_port_buffer[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_port/repl_comm.c:498:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(local_port_buffer, "*UNKNOWN*"); data/fis-gtm-6.3-007/sr_port/repl_comm.c:499:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(local_ip, "*UNKNOWN*"); data/fis-gtm-6.3-007/sr_port/repl_comm.c:506:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(local_port_buffer, "*UNKNOWN*"); data/fis-gtm-6.3-007/sr_port/repl_comm.c:507:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(local_ip, "*UNKNOWN*"); data/fis-gtm-6.3-007/sr_port/repl_comm.c:516:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(remote_port_buffer, "*UNKNOWN*"); data/fis-gtm-6.3-007/sr_port/repl_comm.c:517:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(remote_ip, "*UNKNOWN*"); data/fis-gtm-6.3-007/sr_port/repl_comm.c:524:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(remote_port_buffer, "*UNKNOWN*"); data/fis-gtm-6.3-007/sr_port/repl_comm.c:525:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(remote_ip, "*UNKNOWN*"); data/fis-gtm-6.3-007/sr_port/repl_ctl.h:123:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jnl_fn[JNL_NAME_SIZE]; data/fis-gtm-6.3-007/sr_port/repl_filter.c:199:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, tail_minus_suffix_len); \ data/fis-gtm-6.3-007/sr_port/repl_filter.c:209:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_jnl_tid[TID_STR_SIZE]; \ data/fis-gtm-6.3-007/sr_port/repl_filter.c:212:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_jnl_tid, jb, SIZEOF(((struct_jrec_tcom *)NULL)->jnl_tid)); \ data/fis-gtm-6.3-007/sr_port/repl_filter.c:231:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, tmp_jnl_tid, SIZEOF(((struct_jrec_tcom *)NULL)->jnl_tid)); \ data/fis-gtm-6.3-007/sr_port/repl_filter.c:264:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, tail_minus_suffix_len); \ data/fis-gtm-6.3-007/sr_port/repl_filter.c:294:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, SIZEOF(((struct_jrec_tcom *)NULL)->jnl_tid)); \ data/fis-gtm-6.3-007/sr_port/repl_filter.c:503:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[4096], *delim_p, *strtokptr; data/fis-gtm-6.3-007/sr_port/repl_filter.c:721:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(line, srv_line_start, l_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:879:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(recv_extract_buff, extr_rec, firstrec_len); /* note: includes terminating null */ data/fis-gtm-6.3-007/sr_port/repl_filter.c:912:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, recv_extract_buff, extr_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:917:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(recv_extract_buff + extr_len, extr_rec, extr_reclen); data/fis-gtm-6.3-007/sr_port/repl_filter.c:977:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*tr, (char *)&null_jnlrec, NULL_RECLEN); data/fis-gtm-6.3-007/sr_port/repl_filter.c:1331:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, t_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:1433:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, t_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:1643:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, V19_UPDATE_NUM_OFFSET); data/fis-gtm-6.3-007/sr_port/repl_filter.c:1647:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + V19_UPDATE_NUM_OFFSET + 8, jb + V19_UPDATE_NUM_OFFSET, data/fis-gtm-6.3-007/sr_port/repl_filter.c:1673:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, V19_TCOM_FILLER_SHORT_OFFSET); data/fis-gtm-6.3-007/sr_port/repl_filter.c:1677:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + V19_TCOM_FILLER_SHORT_OFFSET + 8, jb + V19_TCOM_FILLER_SHORT_OFFSET, data/fis-gtm-6.3-007/sr_port/repl_filter.c:1684:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, conv_reclen); data/fis-gtm-6.3-007/sr_port/repl_filter.c:1686:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, V19_NULL_FILLER_OFFSET); data/fis-gtm-6.3-007/sr_port/repl_filter.c:1690:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + V19_NULL_FILLER_OFFSET + 8, jb + V19_NULL_FILLER_OFFSET, data/fis-gtm-6.3-007/sr_port/repl_filter.c:1816:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, t_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:1858:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:1883:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:1890:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2039:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, V19_UPDATE_NUM_OFFSET); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2043:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + V19_UPDATE_NUM_OFFSET + 8, jb + V19_UPDATE_NUM_OFFSET, data/fis-gtm-6.3-007/sr_port/repl_filter.c:2070:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, V19_TCOM_FILLER_SHORT_OFFSET); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2074:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + V19_TCOM_FILLER_SHORT_OFFSET + 8, jb + V19_TCOM_FILLER_SHORT_OFFSET, data/fis-gtm-6.3-007/sr_port/repl_filter.c:2081:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, conv_reclen); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2083:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, V19_NULL_FILLER_OFFSET); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2087:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + V19_NULL_FILLER_OFFSET + 8, jb + V19_NULL_FILLER_OFFSET, data/fis-gtm-6.3-007/sr_port/repl_filter.c:2200:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, t_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2247:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2272:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2279:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2424:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, conv_reclen); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2448:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, conv_reclen); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2454:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, conv_reclen); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2598:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, conv_reclen); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2622:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, conv_reclen); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2628:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, conv_reclen); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2767:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, conv_reclen); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2791:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, conv_reclen); data/fis-gtm-6.3-007/sr_port/repl_filter.c:2797:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, jb, conv_reclen); data/fis-gtm-6.3-007/sr_port/repl_phase2_salvage.c:91:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnldata_base + write, &null_rec, rlen); data/fis-gtm-6.3-007/sr_port/repl_phase2_salvage.c:94:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnldata_base + write, jnlrecptr, dstlen); data/fis-gtm-6.3-007/sr_port/repl_phase2_salvage.c:95:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnldata_base, jnlrecptr + dstlen, rlen - dstlen); data/fis-gtm-6.3-007/sr_port/repl_sort_tr_buff.c:164:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(private_tr_buff, tr_buff, tr_bufflen); data/fis-gtm-6.3-007/sr_port/repl_sort_tr_buff.c:230:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst_addr, working_record_addr, copy_len); data/fis-gtm-6.3-007/sr_port/resolve_optimize.c:74:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(source_line->addr, routine_name.addr, source_line->len); data/fis-gtm-6.3-007/sr_port/resolve_optimize.c:130:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(source_line->addr, routine_name.addr, source_line->len); data/fis-gtm-6.3-007/sr_port/resolve_optimize.c:140:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(source_line->addr, cur_line->str.addr, cur_line->str.len); data/fis-gtm-6.3-007/sr_port/resolve_optimize.c:150:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_mval.str.addr, source_line->addr, tmp_mval.str.len); data/fis-gtm-6.3-007/sr_port/restrict.c:78:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_port/restrict.c:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rfpath[GTM_PATH_MAX], rcfpath[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_port/restrict.c:130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logger_info[MAX_LOGGER_INFO_LEN + 1]; data/fis-gtm-6.3-007/sr_port/restrict.c:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[MAX_READ_SZ + 1], *lbp, facility[MAX_FACILITY_LEN + 1], group_or_flname[MAX_GROUP_LEN + 1]; data/fis-gtm-6.3-007/sr_port/restrict.c:132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.c:83:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&hdr->checksum_128[0], &ctx->digest[0], MD5_DIGEST_LENGTH); data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.c:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_ROUTINE_CHECKSUM_DIGITS]; data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.c:190:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, (unsigned char *)buf, len); data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.h:35:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[MD5_DIGEST_LENGTH]; data/fis-gtm-6.3-007/sr_port/rtnlaboff2entryref.c:24:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, lab->addr, lab->len); data/fis-gtm-6.3-007/sr_port/rtnlaboff2entryref.c:32:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, rtn->addr, rtn->len); data/fis-gtm-6.3-007/sr_port/s2pool.c:29:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free,a->addr,al); data/fis-gtm-6.3-007/sr_port/s2pool_align.c:34:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, string->addr, length); data/fis-gtm-6.3-007/sr_port/s2pool_concat.c:34:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, a->addr, alen); data/fis-gtm-6.3-007/sr_port/s2pool_concat.c:39:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, dstaddr, dstlen); data/fis-gtm-6.3-007/sr_port/s2pool_concat.c:40:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free + dstlen, a->addr, alen); data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c:262:65: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). } else if ((NULL != save_gv_cur_region) && save_gv_cur_region->open && (NULL != cs_addrs)) data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c:277:47: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). repl_csa = ((NULL != repl_reg) && repl_reg->open) ? REG2CSA(repl_reg) : NULL; data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c:324:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open || reg->was_open) data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c:546:72: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((NULL != (repl_reg = jnlpool->jnlpool_dummy_reg)) && repl_reg->open) /* assignment */ data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c:564:60: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((NULL != save_gv_cur_region) && save_gv_cur_region->open && IS_REG_BG_OR_MM(save_gv_cur_region)) data/fis-gtm-6.3-007/sr_port/secshr_finish_CMT08_to_CMT14.c:194:50: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). repl_csa = ((NULL != repl_reg) && repl_reg->open) ? REG2CSA(repl_reg) : NULL; data/fis-gtm-6.3-007/sr_port/secshr_finish_CMT08_to_CMT14.c:549:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(csa->region->open); data/fis-gtm-6.3-007/sr_port/secshr_rel_crit.c:54:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_port/secshr_rel_crit.c:57:45: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (is_repl_reg && ((NULL == reg) || !reg->open)) data/fis-gtm-6.3-007/sr_port/secshr_send_DBCLNUPINFO_msg.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secshr_string[SECSHR_STRINGSIZE]; data/fis-gtm-6.3-007/sr_port/secshr_send_DBCLNUPINFO_msg.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secshr_string_delta[SECSHR_STR_DELTASIZE]; data/fis-gtm-6.3-007/sr_port/secshr_send_DBCLNUPINFO_msg.c:42:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(secshr_string, " : "); data/fis-gtm-6.3-007/sr_port/set_jnl_info.c:70:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnl_info->jnl, csd->jnl_file_name, jnl_info->jnl_len); data/fis-gtm-6.3-007/sr_port/setzdir.c:25:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char directory_buffer[GTM_MAX_DIR_LEN]; data/fis-gtm-6.3-007/sr_port/setzdir.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char directory[GTM_MAX_DIR_LEN], *getcwd_res, *err_str; data/fis-gtm-6.3-007/sr_port/setzdir.c:45:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(directory, newdir->str.addr, newdir->str.len); data/fis-gtm-6.3-007/sr_port/sgnl_gvnulsubsc.c:32:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port/sgnl_gvreplerr.c:26:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port/sgnl_gvundef.c:26:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port/shmpool.h:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_8byte[8]; /* Main queue fields */ data/fis-gtm-6.3-007/sr_port/shmpool.h:106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempfilename[256]; /* Name of temporary file we are using (backup only) */ data/fis-gtm-6.3-007/sr_port/show_source_line.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char source_line_buff[MAX_SRCLINE + SIZEOF(ARROW)]; data/fis-gtm-6.3-007/sr_port/show_source_line.c:97:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, ARROW, STR_LIT_LEN(ARROW)); data/fis-gtm-6.3-007/sr_port/skan_offset.c:33:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char patch_comp_key[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/skan_offset.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/skan_offset.c:63:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "Error: offset greater than blk size of ", 39); data/fis-gtm-6.3-007/sr_port/skan_offset.c:106:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size); data/fis-gtm-6.3-007/sr_port/skan_rnum.c:33:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char patch_comp_key[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_port/skan_rnum.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char util_buff[MAX_UTIL_LEN]; data/fis-gtm-6.3-007/sr_port/skan_rnum.c:95:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size); data/fis-gtm-6.3-007/sr_port/skan_rnum.c:101:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_buff, "Error: last record in blk is ", 29); data/fis-gtm-6.3-007/sr_port/stp_expand_array.c:31:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)stp_array, (uchar_ptr_t)a, n * SIZEOF(mstr *)); data/fis-gtm-6.3-007/sr_port/stp_gcol_src.h:293:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, begaddr, blklen); \ data/fis-gtm-6.3-007/sr_port/stp_init.c:25:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *na_page[2]; data/fis-gtm-6.3-007/sr_port/str2gvkey_nogvfunc.c:46:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key->base, op_gvargs.args[0]->str.addr, key->end); data/fis-gtm-6.3-007/sr_port/stringpool.h:103:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, (KEYSTART), keylen); \ data/fis-gtm-6.3-007/sr_port/strpiecediff.c:101:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char pcdiff_buff[PIECEDIFF_START_BUFSIZ], *pcdiff_start = &pcdiff_buff[0], *pcdiff_top = ARRAYTOP(pcdiff_buff); data/fis-gtm-6.3-007/sr_port/strpiecediff.c:182:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuff, pcdiff_start, bufflen); data/fis-gtm-6.3-007/sr_port/stx_error.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgbuf[MAX_SRCLINE]; data/fis-gtm-6.3-007/sr_port/stx_error.c:74:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_SRCLINE + LISTTAB + SIZEOF(ARROW)]; data/fis-gtm-6.3-007/sr_port/symb_line.c:29:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char temp[OFFSET_LEN], *adjusted_in_addr; data/fis-gtm-6.3-007/sr_port/symb_line.c:79:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, max_label->lab_name.addr, len); data/fis-gtm-6.3-007/sr_port/symb_line.c:115:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (out, &temp[ct], len); data/fis-gtm-6.3-007/sr_port/symb_line.c:124:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, routine->routine_name.addr, len); data/fis-gtm-6.3-007/sr_port/t_commit_cleanup.c:238:97: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (update_jnlpool && update_jnlpool->jnlpool_dummy_reg && update_jnlpool->jnlpool_dummy_reg->open) data/fis-gtm-6.3-007/sr_port/t_commit_cleanup.c:298:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(tr->reg->open); data/fis-gtm-6.3-007/sr_port/t_end.c:91:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/t_end.c:210:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char cw_depth, cw_bmp_depth, buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:351:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(db_addr[0], cs->new_buff, ((blk_hdr_ptr_t)cs->new_buff)->bsiz); data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:369:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(db_addr[0], cs->new_buff, ((blk_hdr_ptr_t)cs->new_buff)->bsiz); data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:730:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(GDS_REL2ABS(cr_new->buffaddr), GDS_REL2ABS(cr->buffaddr), data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1086:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_ptr, cs->new_buff, ((blk_hdr_ptr_t)cs->new_buff)->bsiz); data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1113:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_ptr, cs->new_buff, ((blk_hdr_ptr_t)cs->new_buff)->bsiz); data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1229:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); /* there is no reason we know of why a region should be closed at this point */ data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1230:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) /* in pro, be safe though and don't touch an already closed region */ data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1311:64: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). check_csaddrs = (NULL == save_region || FALSE == save_region->open) ? NULL : &FILE_INFO(save_region)->s_addrs; data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1314:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_port/t_retry.c:85:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char cw_set_depth, cw_map_depth, t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/t_retry.c:101:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF unsigned char t_fail_hist_dbg[T_FAIL_HIST_DBG_SIZE]; data/fis-gtm-6.3-007/sr_port/t_retry.c:126:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *end, buff[MAX_ZWR_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/t_write.c:149:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cse, old_cse, SIZEOF(cw_set_element)); data/fis-gtm-6.3-007/sr_port/targ_alloc.c:63:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gvt->gvname.var_name.addr, gvent->var_name.addr, gvent->var_name.len); data/fis-gtm-6.3-007/sr_port/targ_alloc.c:84:31: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). csa = ((NULL != reg) && reg->open) ? &FILE_INFO(reg)->s_addrs : NULL; data/fis-gtm-6.3-007/sr_port/targ_alloc.c:113:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gvt->gvname.var_name.addr, gvent->var_name.addr, gvent->var_name.len); data/fis-gtm-6.3-007/sr_port/targ_alloc.c:146:50: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert((NULL != gvent) || (NULL == reg) || reg->open || (IS_MUPIP_IMAGE && !mupip_jnl_recover)); data/fis-gtm-6.3-007/sr_port/tcp_open.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_addr[SA_MAXLEN + 1], addr[SA_MAXLEN + 1]; data/fis-gtm-6.3-007/sr_port/tcp_open.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipname[SA_MAXLEN]; data/fis-gtm-6.3-007/sr_port/tcp_open.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer[NI_MAXSERV], *brack_pos; data/fis-gtm-6.3-007/sr_port/tcp_open.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg_buffer[1024]; data/fis-gtm-6.3-007/sr_port/tcp_open.c:112:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, &host[1], addr_len); data/fis-gtm-6.3-007/sr_port/tcp_open.c:126:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, &host[0], addr_len); data/fis-gtm-6.3-007/sr_port/tp.h:203:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (tr->reg->open) \ data/fis-gtm-6.3-007/sr_port/tp.h:663:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. DBGTRIGR_ONLY(char gvnamestr[MAX_MIDENT_LEN + 1];) \ data/fis-gtm-6.3-007/sr_port/tp.h:731:18: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. DBGTRIGR_ONLY(memcpy(gvnamestr, gvnh->gvname.var_name.addr, gvnh->gvname.var_name.len);) \ data/fis-gtm-6.3-007/sr_port/tp.h:851:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(tr->reg->open); \ data/fis-gtm-6.3-007/sr_port/tp.h:852:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!tr->reg->open) \ data/fis-gtm-6.3-007/sr_port/tp.h:911:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&SAVE_KEY[0], gv_currkey, SIZEOF(gv_key) + gv_currkey->end); \ data/fis-gtm-6.3-007/sr_port/tp.h:919:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey, &SAVE_KEY[0], SIZEOF(gv_key) + SAVE_KEY[0].end); \ data/fis-gtm-6.3-007/sr_port/tp_clean_up.c:210:55: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert((NULL == si->kip_csa) || (!gv_cur_region->open || gv_cur_region->was_open)); data/fis-gtm-6.3-007/sr_port/tp_frame.h:36:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&restore_ent->key, (mnamekey), SIZEOF(mname_entry)); \ data/fis-gtm-6.3-007/sr_port/tp_hist.c:369:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(si->last_tp_hist, t1, SIZEOF(srch_blk_status)); data/fis-gtm-6.3-007/sr_port/tp_hist.c:503:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)new_first_tp_hist, (uchar_ptr_t)si->first_tp_hist, data/fis-gtm-6.3-007/sr_port/tp_incr_commit.c:119:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(low_cse, cse, SIZEOF(cw_set_element)); data/fis-gtm-6.3-007/sr_port/tp_restart.c:82:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char *msp, *stackbase, *stacktop, t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/tp_restart.c:144:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *end, buff[MAX_ZWR_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/tp_restart.c:202:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open) data/fis-gtm-6.3-007/sr_port/tp_restart.c:377:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open) data/fis-gtm-6.3-007/sr_port/tp_restart.c:395:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open) data/fis-gtm-6.3-007/sr_port/tp_restart.c:403:41: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). && jnlpool->jnlpool_dummy_reg->open) data/fis-gtm-6.3-007/sr_port/tp_restart.c:557:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_port/tp_restart.c:560:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_port/tp_restart.c:681:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(extnam_str.addr, (TREF(gv_tporig_extnam_str)).addr, len); data/fis-gtm-6.3-007/sr_port/tp_restart.c:772:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dollar_ztwormhole, &mvc->mv_st_cont.mvs_tp_holder.ztwormhole_save, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/tp_restart.c:774:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dollar_ztslate, &literal_null, SIZEOF(mval)); /* Zap $ZTSLate at (re)start of lvl 1 transaction */ data/fis-gtm-6.3-007/sr_port/tp_tend.c:98:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/tp_tend.c:279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char upd_num_seen[256]; data/fis-gtm-6.3-007/sr_port/tp_tend.c:2063:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, pKey->base + bh->prev_rec.match, target_key_size - bh->prev_rec.match); data/fis-gtm-6.3-007/sr_port/tp_tend.c:2068:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(va, value.addr, value.len); data/fis-gtm-6.3-007/sr_port/tp_timeout.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char asccurtime[10]; \ data/fis-gtm-6.3-007/sr_port/trans_numeric.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_TRANS_NAME_LEN], *endptr; data/fis-gtm-6.3-007/sr_port/trap_env_init.c:45:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char init_break[1] = {'B'}; data/fis-gtm-6.3-007/sr_port/trap_env_init.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_SRCLINE + 1], *buf_ptr = &buf[0]; data/fis-gtm-6.3-007/sr_port/trap_env_init.c:66:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dollar_etrap)).str.addr, trans.addr, trans.len); data/fis-gtm-6.3-007/sr_port/trap_env_init.c:86:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(gtm_trigger_etrap)).str.addr, trans.addr, trans.len); data/fis-gtm-6.3-007/sr_port/trap_env_init.c:101:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dollar_zstep)).str.addr, trans.addr, trans.len); data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:271:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vname.c, hte->key.var_name.addr, hte->key.var_name.len); data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:293:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vname.c, hte->key.var_name.addr, hte->key.var_name.len); data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:335:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vname.c, hte->key.var_name.addr, hte->key.var_name.len); data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:351:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*(mv_st_ent->mv_st_cont.mvs_stck.mvs_stck_addr), (char*)mv_st_ent + mvs_size[MVST_STCK], data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:450:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dollar_ecode, &mv_st_ent->mv_st_cont.mvs_zintr.dollar_ecode_save, SIZEOF(dollar_ecode)); data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:451:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dollar_stack, &mv_st_ent->mv_st_cont.mvs_zintr.dollar_stack_save, SIZEOF(dollar_stack)); data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:458:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(extnam_str.addr, mv_st_ent->mv_st_cont.mvs_trigr.savextref.addr, extnam_str.len); data/fis-gtm-6.3-007/sr_port/unw_retarg.c:133:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ret_value, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:158:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gv_mname[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:159:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lcl_key[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:170:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:255:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open) data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:330:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lcl_key, keystr->text, key_len); data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:339:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, lcl_key, key_len); data/fis-gtm-6.3-007/sr_port/updhelper_writer.c:119:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); /* we called region_init() in the initialization code */ data/fis-gtm-6.3-007/sr_port/updhelper_writer.c:123:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open && !reg->read_only) data/fis-gtm-6.3-007/sr_port/updproc.c:119:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_port/updproc.c:140:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char *jrt_label[JRT_RECTYPES]; data/fis-gtm-6.3-007/sr_port/updproc.c:265:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char seq_num_str[32], *seq_num_ptr; data/fis-gtm-6.3-007/sr_port/updproc.c:266:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char seq_num_strx[32], *seq_num_ptrx; data/fis-gtm-6.3-007/sr_port/updproc.c:540:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[MAX_FN_LEN]; data/fis-gtm-6.3-007/sr_port/updproc.c:549:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *endBuff, fmtBuff[MAX_ZWR_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/updproc.c:557:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gv_mname[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/updproc.c:558:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end, scan_char, next_char; data/fis-gtm-6.3-007/sr_port/updproc.c:581:98: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open); data/fis-gtm-6.3-007/sr_port/updproc.c:778:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(histinfo.root_primary_instname, input_old_triple->instname, MAX_INSTNAME_LEN - 1); data/fis-gtm-6.3-007/sr_port/updproc.c:1052:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tcom_record.jnl_tid, rec->jrec_tcom.jnl_tid, TID_STR_SIZE); data/fis-gtm-6.3-007/sr_port/updproc.c:1092:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, keystr->text, keystr->length); data/fis-gtm-6.3-007/sr_port/updproc.c:1307:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_failed_key, gv_currkey, SIZEOF(gv_key) + gv_currkey->end); data/fis-gtm-6.3-007/sr_port/updproc.c:1315:41: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((NULL != save_reg) && save_reg->open) data/fis-gtm-6.3-007/sr_port/urx.h:20:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char name[1]; data/fis-gtm-6.3-007/sr_port/urx.h:28:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char name[1]; data/fis-gtm-6.3-007/sr_port/urx_putlab.c:62:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmplp->name[0], lab, lablen); data/fis-gtm-6.3-007/sr_port/urx_putrtn.c:56:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmp->name[0], rtn, rtnlen); data/fis-gtm-6.3-007/sr_port/util.h:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[OPER_LOG_SIZE]; data/fis-gtm-6.3-007/sr_port/util_base_ch.c:62:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msginfo[4]; data/fis-gtm-6.3-007/sr_port/util_base_ch.c:63:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msg_buff[MAX_MSG_SIZE + 1]; data/fis-gtm-6.3-007/sr_port/util_base_ch.c:79:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (r_local->open && !r_local->was_open) data/fis-gtm-6.3-007/sr_port/v010_jnl.h:111:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[1]; /* Actually buff[size] */ data/fis-gtm-6.3-007/sr_port/v010_jnl.h:141:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char filler_char[2]; data/fis-gtm-6.3-007/sr_port/v010_jnl.h:152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler1[2]; /* prior 3 fields are maintained by AST - preserve memory coherency */ data/fis-gtm-6.3-007/sr_port/v010_jnl.h:198:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[SIZEOF(JNL_LABEL_TEXT) - 1]; data/fis-gtm-6.3-007/sr_port/v010_jnl.h:207:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data_file_name[255]; data/fis-gtm-6.3-007/sr_port/v010_jnl.h:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1]; /* Actually text[length] */ data/fis-gtm-6.3-007/sr_port/v010_jnl.h:283:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char blk_contents[1]; /* Actually blk_contents[bsiz] */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:22:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sname[MAX_SN_LEN]; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:24:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char fname[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:29:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char defext[4]; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:50:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rname[MAX_RN_LEN]; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:55:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bool open; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:71:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char filler[1]; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:73:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char jnl_file_name[JNL_NAME_SIZE]; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:122:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char label[GDS_LABEL_SZ]; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:217:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char jnl_file_name[JNL_NAME_SIZE]; /* journal file name */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:252:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char now_running[MAX_REL_NAME]; /* for active version stamp */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:264:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char common_filler[584 - SIZEOF(v15_bg_trc_rec) * v15_n_bg_trc_rec_variable_types data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:270:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char reorg_restart_key[256]; /* 1st key of a leaf block where reorg was done last time */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:287:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_ino_t[8]; /* this filler is not needed for those platforms that have the data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:318:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler3[932]; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:322:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_3k_64[60]; /* get to 64 byte aligned */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:323:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler1_wc_var_lock[16]; /* moved to node_local */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:324:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_3k_128[48]; /* 3k + 128 - cache line on HPPA */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:325:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler2_db_latch[16]; /* moved to node_local */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:326:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_3k_192[48]; /* 3k + 192 - cache line on HPPA */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:327:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_4096[832]; /* Fill out so map sits on 8K boundary */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:328:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_unique_id[32]; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:329:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char machine_name[MAX_MCNAMELEN]; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:337:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_rep[176]; /* Leave room for non-replication fields */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:356:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_5104[452]; data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:364:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_7k[1024]; /* Fill out so map sits on 8K boundary */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:365:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_8k[1024]; /* Fill out so map sits on 8K boundary */ data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:366:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char master_map[MASTER_MAP_SIZE_V4]; /* This map must be aligned on a block size boundary */ data/fis-gtm-6.3-007/sr_port/valid_mname.h:15:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char ctypetab[NUM_CHARS]; data/fis-gtm-6.3-007/sr_port/view.h:17:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char keyword[16]; data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:70:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *c, *c_top, *dst, *dst_top, global_names[MAX_PARMS], *nextsrc, *src, *src_top, stashed, y; data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:132:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!r_ptr->open) data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:188:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!r_ptr->open) data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:245:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&parmblk->ident.c[0], parm->str.addr, data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:292:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(global_names, tmpstr.addr, tmpstr.len); data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:310:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&lcl_buff.c[0], namestr.addr, namestr.len); data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:314:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&lcl_buff.c[0], src, nextsrc - src - 1); data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:321:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&lcl_buff.c[0], src, (n = nextsrc - src - 1)); data/fis-gtm-6.3-007/sr_port/view_jnlfile.c:51:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, jnl_name_addr, dst->str.len); data/fis-gtm-6.3-007/sr_port/view_routines.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_ROUTINE_CHECKSUM_DIGITS]; data/fis-gtm-6.3-007/sr_port/viewkeys.c:42:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char cmpbuf[VT_KWSIZE]; data/fis-gtm-6.3-007/sr_port/wbox_test_init.c:24:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trans_bufr[MAX_TRANS_NAME_LEN]; data/fis-gtm-6.3-007/sr_port/wcs_recover.c:805:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *end, buff[MAX_ZWR_KEY_SZ]; data/fis-gtm-6.3-007/sr_port/zbreak.h:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[SIZEOF(char *) - SIZEOF(zb_code)]; data/fis-gtm-6.3-007/sr_port/zco_init.c:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[MAX_TRANS_NAME_LEN]; /* buffer to hold translated name */ data/fis-gtm-6.3-007/sr_port/zco_init.c:52:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((TREF(dollar_zcompile)).addr, buf1, tn.len); data/fis-gtm-6.3-007/sr_port/zdate_form_init.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_TRANS_NAME_LEN]; data/fis-gtm-6.3-007/sr_port/zlcompile.c:37:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(source_file_name, addr, len); data/fis-gtm-6.3-007/sr_port/zlput_rname.c:90:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new, rtn_names, (char *)mid - (char *)rtn_names); data/fis-gtm-6.3-007/sr_port/zlput_rname.c:261:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(copy_rhead->labtab_adr, old_rhead->labtab_adr, sect_rw_nonrel_size); data/fis-gtm-6.3-007/sr_port/zr_add_zbreak.c:39:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)zrecs->beg, (char *)temp.beg, (temp.free - temp.beg) * SIZEOF(zbrk_struct)); data/fis-gtm-6.3-007/sr_port/zro_init.c:31:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[MAX_NUMBER_FILENAMES]; /* buffer to hold translated name */ data/fis-gtm-6.3-007/sr_port/zro_init.c:55:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((TREF(dollar_zroutines)).addr, buf1, tn.len); data/fis-gtm-6.3-007/sr_port/zshow_gvstats.c:46:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char valstr[MAX_DIGITS_IN_INT8]; data/fis-gtm-6.3-007/sr_port/zshow_gvstats.c:97:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open || reg->was_open || IS_STATSDB_REG(reg)) data/fis-gtm-6.3-007/sr_port/zshow_gvstats.c:119:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open || IS_STATSDB_REG(reg)) data/fis-gtm-6.3-007/sr_port/zshow_locks.c:32:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char valstr[MAX_DIGITS_IN_INT8]; data/fis-gtm-6.3-007/sr_port/zshow_output.c:167:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out->ptr, strbase, outlen); data/fis-gtm-6.3-007/sr_port/zshow_output.c:176:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out->ptr, str->addr + str_processed, len); data/fis-gtm-6.3-007/sr_port/zshow_output.c:295:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out->ptr, strbase, len); data/fis-gtm-6.3-007/sr_port/zshow_output.c:312:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mv->str.addr, &out->buff[0], mv->str.len); data/fis-gtm-6.3-007/sr_port/zshow_output.c:319:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out->ptr, str->addr + str_processed, len); data/fis-gtm-6.3-007/sr_port/zshow_output.c:337:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mv->str.addr, &out->buff[0], mv->str.len); data/fis-gtm-6.3-007/sr_port/zshow_output.c:431:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out->ptr, strbase, len); data/fis-gtm-6.3-007/sr_port/zshow_output.c:459:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mv->str.addr, &out->buff[0], mv->str.len); data/fis-gtm-6.3-007/sr_port/zshow_output.c:474:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out->ptr, str->addr + str_processed, len); data/fis-gtm-6.3-007/sr_port/zshow_output.c:503:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mv->str.addr, &out->buff[0], mv->str.len); data/fis-gtm-6.3-007/sr_port/zshow_output.c:525:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out->ptr, str->addr, len); data/fis-gtm-6.3-007/sr_port/zshow_stack.c:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ENTRYREF_LEN + MAX_ROUTINE_CHECKSUM_DIGITS + SIZEOF(INDR_OVERFLOW)]; data/fis-gtm-6.3-007/sr_port/zshow_svn.c:232:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, (char *)tl->dollar_io, tl->len); \ data/fis-gtm-6.3-007/sr_port/zshow_svn.c:236:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, DOLLARZ.addr, DOLLARZ.len); \ data/fis-gtm-6.3-007/sr_port/zshow_svn.c:252:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zdir_error[ZDIR_ERR_LEN]; data/fis-gtm-6.3-007/sr_port/zshow_svn.c:502:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zdir_error, zdir.str.addr, zdir.str.len); data/fis-gtm-6.3-007/sr_port/zshow_svn.c:503:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zdir_error[zdir.str.len], arrow_text, STR_LIT_LEN(arrow_text)); data/fis-gtm-6.3-007/sr_port/zshow_svn.c:757:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&var, &literal_zero, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/zshow_svn.c:769:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&var, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/zshow_svn.c:800:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&var, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/zshow_svn.c:812:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&var, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/zshow_svn.c:834:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&var, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/zshow_svn.c:854:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&var, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/zshow_svn.c:866:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&var, &literal_null, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_port/zshow_zbreaks.c:24:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entryrefbuff[MAX_ENTRYREF_LEN]; data/fis-gtm-6.3-007/sr_port/zwr2format.c:32:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dstptr[des->len], cpstart, (cp) - cpstart); \ data/fis-gtm-6.3-007/sr_port/zyerror_init.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:62:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(proto.msg + CM_CPU_OFFSET, encode_cpu(), 3); data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:63:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(proto.msg + CM_OS_OFFSET, encode_os(), 3); data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:64:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(proto.msg + CM_IMPLEMENTATION_OFFSET, "GTM", 3); data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:71:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(proto.msg + CM_TYPE_OFFSET, CMM_PROTOCOL_TYPE, 3); data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:75:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(proto.msg + CM_LEVEL_OFFSET, &cm_ver_name[1], 3); data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:84:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pro->msg, proto.msg, S_PROTSIZE); data/fis-gtm-6.3-007/sr_port_cm/gtcml_lklist.c:65:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&new_entry->value[0], ptr, len); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_bufflush.c:44:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_bufflush.c:66:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_currkey->base[cc], ptr, len); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_get.c:66:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, v.str.addr, temp_short); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_increment.c:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_increment.c:114:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, post_incr.str.addr, temp_short); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initproc.c:73:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char *)originator_prc_vec, reply + S_HDRSIZE + S_PROTSIZE, jpv_size); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initproc.c:78:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reply, &myproto, S_PROTSIZE); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initproc.c:87:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reply, S_PROTOCOL, S_PROTSIZE); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initreg.c:38:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_clearreq.c:70:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(creq.node, node->addr, node->len); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_showrep.c:79:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)lke_ctl, pctl.ctl, ls_len); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_showreq.c:61:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sreq.node, node->addr, node->len); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_order.c:176:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr + SIZEOF(unsigned short) + SIZEOF(unsigned short) + SIZEOF(unsigned short), gv_altkey->base, data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_put.c:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_query.c:133:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, gv_altkey->base, key_len - SIZEOF(unsigned short) - SIZEOF(unsigned short) - SIZEOF(unsigned short)); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_query.c:140:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, val.str.addr, tmp_len); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_zprevious.c:169:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr + SIZEOF(unsigned short) + SIZEOF(unsigned short) + SIZEOF(unsigned short), gv_altkey->base, data/fis-gtm-6.3-007/sr_port_cm/gvcmx_increment.c:33:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:62:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[256], lbuff[MAX_HOST_NAME_LEN + GTCM_ENVVAR_PFXLEN]; data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:83:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lbuff, GTCM_ENVVAR_PFX, GTCM_ENVVAR_PFXLEN); data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:84:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lbuff + GTCM_ENVVAR_PFXLEN, node.addr, node.len); data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:95:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(task2.addr, trans_name, task2.len); data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:135:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, fn, top - fn); data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:171:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(libuff, li->buffer, li->buffer_used); data/fis-gtm-6.3-007/sr_port_cm/gvcmy_remlkmgr.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errbuf[CM_ERRBUFF_SIZE]; data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c:45:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char base[1]; data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c:191:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffptr + new_space, buffptr, bufftop - buffptr); /* shuffle buffer to make room for new record */ data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c:192:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(insert_record, &nrec, SIZEOF(nrec) - 1); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c:194:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(insert_record, &gv_currkey->base[cc], nrec.len); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c:200:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(insert_record, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c:46:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c:112:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, gv_currkey->base, gv_currkey->end + 1); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c:120:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr,v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c:200:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_altkey->base, ptr, len - 1 - SIZEOF(unsigned short) - SIZEOF(unsigned short) - data/fis-gtm-6.3-007/sr_port_cm/gvcmz_int_lkcancel.c:49:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char temp[16]; data/fis-gtm-6.3-007/sr_port_cm/gvcmz_int_lkcancel.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errbuf[CM_ERRBUFF_SIZE]; data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lksublist.c:73:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, lk_walk->value, lk_walk->nref_length); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_neterr.c:43:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *temp, buff[512]; data/fis-gtm-6.3-007/sr_port_cm/gvcmz_neterr.c:113:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(err_buff, err, count * SIZEOF(INTPTR_T)); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:103:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char *)&temp_vect, (unsigned char *)prc_vec, SIZEOF(jnl_process_vector)); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:108:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr + S_PROTSIZE, (unsigned char *)&temp_vect, SIZEOF(jnl_process_vector)); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:110:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr + S_PROTSIZE, (unsigned char *)prc_vec, prc_vec_size); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:113:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, proto_str, S_PROTSIZE); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:163:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c->nod.dsc$a_pointer, node->dsc$a_pointer, node->dsc$w_length); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:166:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c->tnd.dsc$a_pointer, task->dsc$a_pointer, task->dsc$w_length); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:177:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c->nod.addr, node->addr, node->len); data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:180:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c->tnd.addr, task->addr, task->len); data/fis-gtm-6.3-007/sr_unix/aio_shim.c:147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_buffer[GTM_PATH_MAX + SIZEOF(ERROR_LIT) + 3]; \ data/fis-gtm-6.3-007/sr_unix/aio_shim.c:526:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open && reg->dyn.addr->asyncio && (dba_cm != reg->dyn.addr->acc_meth)) data/fis-gtm-6.3-007/sr_unix/anticipatory_freeze.c:244:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_READ_SZ], mnemonic_buf[MAX_TAG_LEN]; data/fis-gtm-6.3-007/sr_unix/auto_zlink.c:50:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rname_buff.c, rname.addr, rname.len); data/fis-gtm-6.3-007/sr_unix/auto_zlink.c:106:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rtnname.c, rtnname_adr, rtnname_len); data/fis-gtm-6.3-007/sr_unix/bin_load.c:215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zwrbuff[ZWR_BASE_STRIDE * MAX_ZWR_EXP_RATIO], savechar; data/fis-gtm-6.3-007/sr_unix/bin_load.c:246:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hdr_lvl, src_buff[MAX_KEY_SZ + 1], dest_buff[MAX_ZWR_KEY_SZ], data/fis-gtm-6.3-007/sr_unix/bin_load.c:270:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char std_null_coll[BIN_HEADER_NUMSZ + 1], *sn_hold_buff = NULL, *sn_hold_buff_temp = NULL; data/fis-gtm-6.3-007/sr_unix/bin_load.c:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char index_err_buf[1024]; data/fis-gtm-6.3-007/sr_unix/bin_load.c:284:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char key_buffer[MAX_ZWR_KEY_SZ]; data/fis-gtm-6.3-007/sr_unix/bin_load.c:290:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg_buff[MAX_RECLOAD_ERR_MSG_SIZE]; data/fis-gtm-6.3-007/sr_unix/bin_load.c:355:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(std_null_coll, ptr + BIN_HEADER_NULLCOLLOFFSET, BIN_HEADER_NUMSZ); data/fis-gtm-6.3-007/sr_unix/bin_load.c:360:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(std_null_coll, ptr + V5_BIN_HEADER_NULLCOLLOFFSET, V5_BIN_HEADER_NUMSZ); data/fis-gtm-6.3-007/sr_unix/bin_load.c:379:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(encrypted_hash_array_ptr, ptr, encrypted_hash_array_len); data/fis-gtm-6.3-007/sr_unix/bin_load.c:403:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(null_iv_array_ptr, ptr, null_iv_array_len); data/fis-gtm-6.3-007/sr_unix/bin_load.c:707:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, cmpc_str, next_cmpc); data/fis-gtm-6.3-007/sr_unix/bin_load.c:713:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmpc_str, gv_currkey->base, next_cmpc); data/fis-gtm-6.3-007/sr_unix/bin_load.c:718:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dup_key_str, gv_currkey->base, gv_currkey->end + 1); data/fis-gtm-6.3-007/sr_unix/bin_load.c:758:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_key_ptr, tmp_gvkey->base, tmp_gvkey->end + 1); data/fis-gtm-6.3-007/sr_unix/bin_load.c:806:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&subtocheck, &mych, 1); data/fis-gtm-6.3-007/sr_unix/bin_load.c:822:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&subtocheck, &mych, 1); data/fis-gtm-6.3-007/sr_unix/bin_load.c:920:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sn_gvkey->base, gv_currkey->base, sn_gvkey->end); data/fis-gtm-6.3-007/sr_unix/bin_load.c:946:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sn_hold_buff_temp, sn_hold_buff, sn_hold_buff_pos); data/fis-gtm-6.3-007/sr_unix/bin_load.c:950:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sn_hold_buff + sn_hold_buff_pos, v.str.addr, v.str.len); data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c:46:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF unsigned char gtmvectortable_address[MAX_ADDR_SIZE]; data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c:47:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF unsigned char gtmvectortable_env[MAX_ADDR_ENV_SIZE]; data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c:62:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((env_top + strlen(GTM_CALLIN_START_ENV)), gtmvectortable_address, address_len); data/fis-gtm-6.3-007/sr_unix/ce_init.c:24:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/fis-gtm-6.3-007/sr_unix/ce_substitute.c:22:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *cp, sub_buffer[MAX_SRCLINE]; data/fis-gtm-6.3-007/sr_unix/cenable.c:28:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char cenable_params_list[2] = data/fis-gtm-6.3-007/sr_unix/cli.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:74:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:136:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:167:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:168:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:198:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:199:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:231:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:261:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:262:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:295:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, buf, copylen); data/fis-gtm-6.3-007/sr_unix/cli.c:313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1], *cp, local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:359:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:360:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:402:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:403:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:435:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.c:436:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE + 1]; data/fis-gtm-6.3-007/sr_unix/cli.h:74:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_OPT_LEN]; data/fis-gtm-6.3-007/sr_unix/cli.h:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prompt[MAX_OPT_LEN]; data/fis-gtm-6.3-007/sr_unix/cli.h:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_OPT_LEN]; /* name string */ data/fis-gtm-6.3-007/sr_unix/cli_disallow.c:42:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cli_err_str + lencli," ",1); data/fis-gtm-6.3-007/sr_unix/cli_disallow.c:43:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cli_err_str + lencli + 1, str, lenstr); data/fis-gtm-6.3-007/sr_unix/cli_lex.c:34:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char cli_token_buf[MAX_LINE + 1]; /* Token buffer */ data/fis-gtm-6.3-007/sr_unix/cli_lex.c:196:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cli_lex_in_ptr->in_str, addr, addrlen); data/fis-gtm-6.3-007/sr_unix/cli_lex.c:373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cli_fgets_buffer[MAX_LINE], *destbuffer, *retptr; data/fis-gtm-6.3-007/sr_unix/cli_lex.c:485:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(destbuffer, cli_fgets_buffer, in_len); data/fis-gtm-6.3-007/sr_unix/cli_parse.c:311:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TAREF1(parm_ary, TREF(parms_cnt)), cli_token_buf, TAREF1(parm_str_len, TREF(parms_cnt))); data/fis-gtm-6.3-007/sr_unix/cli_parse.c:579:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE], tmp_str[MAX_LINE + 1], *tmp_str_ptr; data/fis-gtm-6.3-007/sr_unix/cli_parse.c:837:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE], *tmp_ptr; data/fis-gtm-6.3-007/sr_unix/cli_parse.c:884:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE]; data/fis-gtm-6.3-007/sr_unix/cli_parse.c:917:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE]; data/fis-gtm-6.3-007/sr_unix/cli_parse.c:969:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_str[MAX_LINE]; data/fis-gtm-6.3-007/sr_unix/cli_parse.c:982:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *gets_res, local_str[MAX_LINE], *sp; data/fis-gtm-6.3-007/sr_unix/cli_parse.c:1030:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TAREF1(parm_ary, match_ind), input_line->str.addr, parm_len); data/fis-gtm-6.3-007/sr_unix/cli_parse.c:1062:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TAREF1(parm_ary, match_ind), cli_token_buf, parm_len); data/fis-gtm-6.3-007/sr_unix/cmidefsp.h:74:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lenbuf[2]; /* order. We maintain len in network byte order until the length bytes are successfully sent. */ data/fis-gtm-6.3-007/sr_unix/condstk_expand.c:56:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_chnd, chnd, old_len); /* Copy occupied part of old stack */ data/fis-gtm-6.3-007/sr_unix/db_ipcs_reset.c:82:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(!reg->open); data/fis-gtm-6.3-007/sr_unix/db_snapshot.h:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shadow_file[GTM_PATH_MAX]; /* Temporary file that will contain the before images */ data/fis-gtm-6.3-007/sr_unix/db_snapshot.h:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shadow_file[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/db_snapshot.h:94:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[SIZEOF(SNAPSHOT_HDR_LABEL) - 1]; data/fis-gtm-6.3-007/sr_unix/db_snapshot.h:97:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char filler[976]; data/fis-gtm-6.3-007/sr_unix/dec_err.c:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgbuff[2048]; data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:55:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char dl_err[MAX_ERRSTR_LEN]; /* This is maintained by gtm_tls_loadlibrary() */ data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:312:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[SA_MAXLEN + 1]; data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:314:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer[NI_MAXSERV + 1]; data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:318:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tlsid[MAX_TLSID_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:372:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(audit_conn->tls_id, tlsid, MAX_TLSID_LEN + 1); data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:404:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char log_msg_pre[GTM_PATH_MAX + MAX_AUDIT_PROC_INFO_LEN + MAX_SRCLINE + 1], *log_msg; data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:405:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd_pre[MAX_SRCLINE + 1], *cmd, *errptr; data/fis-gtm-6.3-007/sr_unix/dm_read.c:155:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[3]; data/fis-gtm-6.3-007/sr_unix/dm_read.c:156:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_str[MAX_RECALL_NUMBER_LENGTH + 1]; data/fis-gtm-6.3-007/sr_unix/dm_read.c:182:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char escape_sequence[ESC_LEN]; data/fis-gtm-6.3-007/sr_unix/dm_read.c:184:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char more_buf[GTM_MB_LEN_MAX + 1], *more_ptr; /* to build up multi byte for character */ data/fis-gtm-6.3-007/sr_unix/dm_read.c:245:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(more_buf, tt_state->more_buf, SIZEOF(more_buf)); data/fis-gtm-6.3-007/sr_unix/dm_read.c:257:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(escape_sequence, tt_state->escape_sequence, ESC_LEN); data/fis-gtm-6.3-007/sr_unix/dm_read.c:328:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tt_state->more_buf, more_buf, SIZEOF(more_buf)); data/fis-gtm-6.3-007/sr_unix/dm_read.c:342:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tt_state->escape_sequence, escape_sequence, ESC_LEN); data/fis-gtm-6.3-007/sr_unix/dm_read.c:565:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. write_str((unsigned char *)comline_base[cur_cl].addr, data/fis-gtm-6.3-007/sr_unix/dm_read.c:599:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. write_str((unsigned char *)comline_base[histidx].addr, data/fis-gtm-6.3-007/sr_unix/dm_read.c:606:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. outtop = (unsigned char *)comline_base[histidx].addr + len; data/fis-gtm-6.3-007/sr_unix/dm_read.c:607:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (outptr = (unsigned char *)comline_base[histidx].addr; data/fis-gtm-6.3-007/sr_unix/dm_read.c:624:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer_start, comline_base[histidx].addr, data/fis-gtm-6.3-007/sr_unix/dm_read.c:637:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. strlen((char *)recall_error_msg[err_recall])); data/fis-gtm-6.3-007/sr_unix/dm_read.c:862:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. outtop = (unsigned char *)comline_base[cl].addr + len; data/fis-gtm-6.3-007/sr_unix/dm_read.c:863:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (outptr = (unsigned char *)comline_base[cl].addr; outptr < outtop; ) data/fis-gtm-6.3-007/sr_unix/dm_read.c:879:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer_start, comline_base[cl].addr, outlen); data/fis-gtm-6.3-007/sr_unix/do_xform.c:76:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(output->addr, ba, *length); data/fis-gtm-6.3-007/sr_unix/do_xform.c:110:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(output->addr, ba, *length); data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:41:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char LITDEF gde_labels[GDE_LABEL_NUM][GDE_LABEL_SIZE] = data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:76:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new->addr, pblk.buffer, pblk.b_esl); data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:90:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fp->v.addr, v->addr, v->len); data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:96:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, fp->v.addr, fp->v.len); data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_buff[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/dse_help.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dse_rel_name[SIZEOF(GTM_RELEASE_NAME) - SIZEOF(GTM_PRODUCT)]; data/fis-gtm-6.3-007/sr_unix/dse_open.c:61:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char patch_ofile[PATCH_FILE_MAX + 1]; data/fis-gtm-6.3-007/sr_unix/dse_open.c:63:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ch_set_name[MAX_CHSET_NAME + 1]; data/fis-gtm-6.3-007/sr_unix/dse_open.c:189:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, addr, len); data/fis-gtm-6.3-007/sr_unix/dse_puttime.c:22:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outbuf[TIME_SIZE * 4]; /* Leave room for unexpected values */ data/fis-gtm-6.3-007/sr_unix/dsk_read.c:180:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, enc_save_buff, SIZEOF(blk_hdr)); data/fis-gtm-6.3-007/sr_unix/dsk_read.c:199:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, enc_save_buff, size); data/fis-gtm-6.3-007/sr_unix/dsk_read.c:205:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, enc_save_buff, size); data/fis-gtm-6.3-007/sr_unix/dsk_read.c:238:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_buff, buff, size); data/fis-gtm-6.3-007/sr_unix/dsk_write_nocache.c:116:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(!reg->open || !csa->acc_meth.bg.cache_state->cache_array || buff != (sm_uc_ptr_t)csd); data/fis-gtm-6.3-007/sr_unix/dsk_write_nocache.c:143:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); /* should be coming in through "gdsfilext" after having done a "gvcst_init" */ data/fis-gtm-6.3-007/sr_unix/dsk_write_nocache.c:148:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dio_buff)).aligned, buff, size); data/fis-gtm-6.3-007/sr_unix/dsk_write_nocache.c:152:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). DB_LSEEKWRITE(reg->open ? csa : NULL, udi, udi->fn, udi->fd, data/fis-gtm-6.3-007/sr_unix/err_init.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char procfn[SIZEOF(COREDUMPFILTERFN) + MAX_DIGITS_IN_INT]; /* File name of file to update */ data/fis-gtm-6.3-007/sr_unix/err_init.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter[FILTERPARMSIZE], *filterend; /* Value read in & written out */ data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:39:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:53:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATICDEF char ext_source_line[MAX_SRC_LINE]; data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:271:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nam[MAX_NAM_LEN]; data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:357:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char number[MAX_DIGITS_IN_INT]; data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:463:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst->addr, src->addr, dst->len); data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:486:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *end, str_buffer[MAX_TABLINE_LEN], str_temp_buffer[MAX_TABLINE_LEN + 1], *tbp; data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:504:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tbp, package->str.addr, package->str.len); data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:769:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buffer[MAX_TABLINE_LEN], *tbp, *end, rcfpath[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:905:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_SRC_LINE], *b; data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:920:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, "^-----", POINTER_SIZE); data/fis-gtm-6.3-007/sr_unix/f_piece.c:92:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(unichar.unibytes_val, delim_mval->str.addr, delim_mval->str.len); data/fis-gtm-6.3-007/sr_unix/fake_enospc.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char enospc_enable_list[MAX_REGIONS]; data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c:35:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_str[MAX_ERRSTR_LEN]; /* needed as util_out_print doesn't handle 64bit pointers */ data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char librarypath[GTM_PATH_MAX], *lpath = NULL; data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_str[MAX_ERRSTR_LEN]; /* needed as util_out_print doesn't handle 64bit pointers */ data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c:150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_str[MAX_ERRSTR_LEN]; data/fis-gtm-6.3-007/sr_unix/file_input.c:47:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buff1[BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/file_input.c:139:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff1_ptr, line1_ptr, line1_len); data/fis-gtm-6.3-007/sr_unix/file_input.c:240:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(in_ptr, val.str.addr, rd_len); data/fis-gtm-6.3-007/sr_unix/file_input.c:297:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_ptr, mbuff, ret_len); data/fis-gtm-6.3-007/sr_unix/file_input.c:303:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char *)(mbuff + ret_len), val.str.addr, rd_len); data/fis-gtm-6.3-007/sr_unix/gds_rundown.c:140:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */ data/fis-gtm-6.3-007/sr_unix/gds_rundown.c:190:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((reg->open) && (dba_usr == csd->acc_meth)) data/fis-gtm-6.3-007/sr_unix/gds_rundown.c:219:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (statsDBreg->open) data/fis-gtm-6.3-007/sr_unix/gds_rundown.c:267:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); /* if we failed to open, dbinit_ch should have taken care of proper clean up */ data/fis-gtm-6.3-007/sr_unix/gds_rundown.c:775:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(db_ipcs.fn, seg->fname, seg->fname_len); data/fis-gtm-6.3-007/sr_unix/gdsfilext_nojnl.c:119:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aligned_buff, newmap, blk_size); data/fis-gtm-6.3-007/sr_unix/genpat.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char source_buffer[MAX_SRCLINE]; data/fis-gtm-6.3-007/sr_unix/genpat.c:79:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(patbuf->str.addr, &pat_ptstr.buff[0], patbuf->str.len); data/fis-gtm-6.3-007/sr_unix/get_command_line.c:54:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cp = (unsigned char *)cmd_arg[1]; data/fis-gtm-6.3-007/sr_unix/get_command_line.c:83:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, cmd_arg[word_cnt], len); data/fis-gtm-6.3-007/sr_unix/get_full_path.c:32:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwdbuf[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/get_full_path.c:46:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(full_fn, orig_fn, length); data/fis-gtm-6.3-007/sr_unix/get_full_path.c:74:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(full_fn, cwdbuf, c1 - cwdbuf); data/fis-gtm-6.3-007/sr_unix/get_full_path.c:75:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(full_fn + (c1 - cwdbuf), cptr, orig_len - (cptr - orig_fn)); data/fis-gtm-6.3-007/sr_unix/get_full_path.c:85:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(full_fn, cwdbuf, cwd_len); data/fis-gtm-6.3-007/sr_unix/get_full_path.c:87:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(full_fn + cwd_len + 1, cptr, orig_len - (cptr - orig_fn)); data/fis-gtm-6.3-007/sr_unix/get_src_line.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_SRCLINE], *cptr, *srcfile_name; data/fis-gtm-6.3-007/sr_unix/get_src_line.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcnamebuf[SIZEOF(mident_fixed) + STR_LIT_LEN(DOTM)]; data/fis-gtm-6.3-007/sr_unix/get_src_line.c:278:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_SRCLINE], *cptr, *fgets_rc, *srcfile_name; data/fis-gtm-6.3-007/sr_unix/get_src_line.c:279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcnamebuf[SIZEOF(mident_fixed) + STR_LIT_LEN(DOTM) + 1]; data/fis-gtm-6.3-007/sr_unix/get_src_line.c:292:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(srcfile_name, rtn_vector->src_full_name.addr, rtn_vector->src_full_name.len); data/fis-gtm-6.3-007/sr_unix/get_src_line.c:305:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(srcnamebuf, rtn_vector->routine_name.addr, srcfilnamlen); data/fis-gtm-6.3-007/sr_unix/get_src_line.c:328:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(srcfile_name, srcdir->str.addr, srcdir->str.len); data/fis-gtm-6.3-007/sr_unix/get_src_line.c:331:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cptr, src.addr, src.len); data/fis-gtm-6.3-007/sr_unix/get_src_line.c:413:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prev_srcptr, buff, size); data/fis-gtm-6.3-007/sr_unix/get_ztimeout.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char full_ztimeout[ZTIMEOUTSTRLEN]; data/fis-gtm-6.3-007/sr_unix/get_ztimeout.c:72:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, full_ztimeout, time_len); data/fis-gtm-6.3-007/sr_unix/get_ztimeout.c:74:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp + time_len, ztimeout_vector_ptr, ztimeout_vector_len); data/fis-gtm-6.3-007/sr_unix/getcaps.c:93:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char gtm_cap_ascii[16 * 16]; /* ESC_LEN from io.h times number of tigetstr values */ data/fis-gtm-6.3-007/sr_unix/getcaps.c:123:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cap_ebcdic[128]; /* more than enough for terminal name */ data/fis-gtm-6.3-007/sr_unix/geteditor.c:50:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(editor.addr, edt, len); data/fis-gtm-6.3-007/sr_unix/go_load.c:127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptr1, msg_buff[128]; data/fis-gtm-6.3-007/sr_unix/go_load.c:163:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_KEY_SZ], msg_buff[MAX_RECLOAD_ERR_MSG_SIZE]; data/fis-gtm-6.3-007/sr_unix/go_load.c:476:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char *)(*in_ptr + ret_len), val.str.addr, rd_len); data/fis-gtm-6.3-007/sr_unix/grab_lock.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scndry_msg[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/gt_timer.h:79:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hd_data[1]; /* Handler data */ data/fis-gtm-6.3-007/sr_unix/gt_timer.h:157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_unknown[MAX_UNKNOWN_LEN]; \ data/fis-gtm-6.3-007/sr_unix/gt_timers.c:107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[512]; \ data/fis-gtm-6.3-007/sr_unix/gt_timers.c:174:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&trc_timerpop_array[trc_timerpop_idx], TIMER_INFO, SIZEOF(GT_TIMER)); \ data/fis-gtm-6.3-007/sr_unix/gt_timers.c:829:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(deferred_tid, deferred_tids, offset * SIZEOF(TID)); data/fis-gtm-6.3-007/sr_unix/gt_timers.c:953:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ntp->hd_data, hdata, hdata_len); data/fis-gtm-6.3-007/sr_unix/gtm.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtmshr_file[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm.c:107:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(>mshr_file[0], fptr, dir_len); data/fis-gtm-6.3-007/sr_unix/gtm.c:109:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(>mshr_file[dir_len+1], GTMSHR_IMAGE_NAME, STR_LIT_LEN(GTMSHR_IMAGE_NAME)); data/fis-gtm-6.3-007/sr_unix/gtm_bintim.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char month[256]; data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace.c:71:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(gtm_waitstuck_script)).addr, trans.addr, trans.len); data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace.c:85:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trans.addr, (TREF(gtm_waitstuck_script)).addr, trans.len); data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace.c:94:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(currpos, message, messagelen); data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace_semop.c:42:48: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((NULL != gv_cur_region) && gv_cur_region->open && (NULL != cs_addrs)) data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ceprep_file[MAX_FN_LEN + 1], list_file[MAX_FN_LEN + 1], obj_file[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char source_file_string[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:99:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(orig_cmdstr.addr, cli_lex_in_ptr->in_str + strlen("MUMPS "), orig_cmdstr.len); data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:28:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathbuf[MAX_FN_LEN]; data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:56:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmd_ptr, path_tok, tok_len); data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:60:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmd_ptr, command, cmdlen - 1); /*Don't copy the trailing space in the command*/ data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:68:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(command , cmd_path, cmdlen); data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:69:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(command + cmdlen, " ", 1); data/fis-gtm-6.3-007/sr_unix/gtm_conv_init.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[MAX_CHSET_LEN]; data/fis-gtm-6.3-007/sr_unix/gtm_dbjnl_dupfd_check.c:65:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_unix/gtm_dbjnl_dupfd_check.c:152:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open || reg->was_open) data/fis-gtm-6.3-007/sr_unix/gtm_dump_core.c:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newname[CORE_NAME_LEN]; data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:100:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char io_setup_errstr[IO_SETUP_ERRSTR_ARRAYSIZE]; data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:114:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char editing_index[27] = data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_SRCLINE + 1], *token, cwd[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:155:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cwdptr, &cwd, cwdlen); data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:159:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cwdptr, GTMCORENAME, SIZEOF(GTMCORENAME)); /* Also copys in trailing null */ data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:323:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(gtm_custom_errors)).addr, buf, trans.len); data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:359:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(gtm_linktmpdir)).addr, trans.addr, trans.len); data/fis-gtm-6.3-007/sr_unix/gtm_env_translate.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pakname[PATH_MAX + 1]; data/fis-gtm-6.3-007/sr_unix/gtm_env_translate.c:47:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pakname, env_gtm_env_xlate.addr, env_gtm_env_xlate.len); data/fis-gtm-6.3-007/sr_unix/gtm_fd_trace.c:102:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(pathname, flags); data/fis-gtm-6.3-007/sr_unix/gtm_fd_trace.c:111:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(pathname, flags, mode); data/fis-gtm-6.3-007/sr_unix/gtm_file_stat.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuff[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtm_file_stat.c:45:18: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). mstr tmp_str, *tmpfile; data/fis-gtm-6.3-007/sr_unix/gtm_file_stat.c:55:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fbuff, file->addr, file->len); data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:77:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldname[1024], newname[1024], *trcpath, *trcsuffix; data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:128:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(oldname, "/systrace"); /* add file name */ data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:149:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(newname, "trace -a -L 8000000 -o "); data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outbuf[32]; data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:82:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, fac, j); data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:104:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, tag, j); data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:113:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, msgp, top - cp); data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:54:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:166:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_errstr[SIZEOF(GTM_ICU_VERSION) + STR_LIT_LEN(GTM_ICU_VERSION_SUFFIX)]; /* "$gtm_icu_version is" */ data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:210:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *locale, *chset, *libname, err_msg[MAX_ERRSTR_LEN]; data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:211:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char icu_final_fname[MAX_ICU_FNAME_LEN + 1 + MAX_ICU_VERSION_STRLEN]; /* 1 for '_' in between */ data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:212:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char icu_ver_buf[MAX_ICU_VERSION_STRLEN], icusymver[MAX_ICU_VERSION_STRLEN], iculibver[MAX_ICU_VERSION_STRLEN]; data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:213:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_errstr[SIZEOF(ICU_LIBNAME) + STR_LIT_LEN(ICU_LIBNAME_SUFFIX)]; /* "libicuio.so has version" */ data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:214:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char icu_libname[SIZEOF(ICU_LIBNAME) + MAX_ICU_VERSION_STRLEN]; data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:227:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char real_path[GTM_PATH_MAX], librarypath[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:231:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ICU_LIBNAME_LEN], temp_path[GTM_PATH_MAX], search_paths[MAX_SEARCH_PATH_LEN]; data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:279:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&icu_libname[icu_libname_len], ICU_LIBNAME_ROOT, len); data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:281:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&icu_libname[icu_libname_len], iculibver, iculibver_len); data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:285:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&icu_libname[icu_libname_len], ICU_LIBNAME_EXT, len); data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:290:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&icu_libname[icu_libname_len], ICU_LIBNAME, len); data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:293:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&icu_libname[icu_libname_len], iculibver, iculibver_len); data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:398:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ptr, ".so)"); /* buf = /usr/local/lib64/libicuio36.0.a(libicuio36.0.so) */ data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:448:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&icu_final_fname[icu_final_fname_len], cur_icu_fname, len); data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:465:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&icu_final_fname[icu_final_fname_len], icusymver, icusymver_len); data/fis-gtm-6.3-007/sr_unix/gtm_main.c:58:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_main.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtmlibxc[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_main.c:107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tlsid_env_name[MAX_TLSID_LEN * 2]; data/fis-gtm-6.3-007/sr_unix/gtm_main.c:219:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tlsid_env_name, ptr, (int)(eq - ptr)); data/fis-gtm-6.3-007/sr_unix/gtm_multi_proc.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[256]; data/fis-gtm-6.3-007/sr_unix/gtm_multi_proc.c:320:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[256]; data/fis-gtm-6.3-007/sr_unix/gtm_multi_proc.c:408:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mp_hdr->pvt_ret_array, mp_hdr->shm_ret_array, (SIZEOF(void *) * mp_hdr->ntasks)); data/fis-gtm-6.3-007/sr_unix/gtm_permissions.c:33:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_permissions.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_permissions.h:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_perm[MAX_PERM_LEN]; data/fis-gtm-6.3-007/sr_unix/gtm_permissions.h:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lib_perm[MAX_PERM_LEN]; data/fis-gtm-6.3-007/sr_unix/gtm_permissions.h:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char print_gid_list[MAX_PRINT_GID_LEN]; /* Can't imagine this getting any longer in the real world */ data/fis-gtm-6.3-007/sr_unix/gtm_putmsg_list.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg_buffer[1024]; data/fis-gtm-6.3-007/sr_unix/gtm_semutils.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *sem_names[2] = {"FTOK", "access control"}; /* based on gtm_semtype enum order */ data/fis-gtm-6.3-007/sr_unix/gtm_startup.c:183:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(temp, (TREF(tpnotacidtime)).str.addr, (TREF(tpnotacidtime)).str.len); data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:52:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char image_real_path[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char real_gtm_dist_path[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comparison[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_stdio.c:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[buflen + 1]; /* C99: Variable Length Array, avoids malloc. */ data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:46:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). VAR = fopen(PATH, MODE); \ data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:57:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). VAR = fopen(PATH, MODE); \ data/fis-gtm-6.3-007/sr_unix/gtm_text_alloc.c:286:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nullHMark[4]; data/fis-gtm-6.3-007/sr_unix/gtm_text_alloc.c:287:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nullStr[1]; data/fis-gtm-6.3-007/sr_unix/gtm_text_alloc.c:288:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nullTMark[4]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:760:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *env_name_ptr, env_name[PASSPHRASE_ENVNAME_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:790:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pwent->env_value, obs_passwd, obs_len + 1); /* include null */ data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:806:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *env_name_ptr, *env_value, prompt[GTM_PASSPHRASE_MAX_ASCII + 1]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:837:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg_path[MAX_CONFIG_LOOKUP_PATHLEN]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:877:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg_path[MAX_CONFIG_LOOKUP_PATHLEN]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:947:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg_path[MAX_CONFIG_LOOKUP_PATHLEN], input_env_name[PASSPHRASE_ENVNAME_MAX + 1], *env_name_ptr; data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:948:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prompt[GTM_PASSPHRASE_MAX_ASCII + 1]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:951:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char session_id_string[SSL_MAX_SSL_SESSION_ID_LENGTH]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1175:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(private_key, "r"); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1453:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg_path[MAX_CONFIG_LOOKUP_PATHLEN]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1533:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg_path[MAX_CONFIG_LOOKUP_PATHLEN]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1541:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char session_id_string[SSL_MAX_SSL_SESSION_ID_LENGTH]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char protocol[MAX_ALGORITHM_LEN]; /* Descriptive name of the negoitiated protocol (for instance, TLSv1). */ data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char session_algo[MAX_ALGORITHM_LEN];/* Algorithm negoitated by the SSL/TLS session. */ data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:99:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char session_id[MAX_SESSION_ID_LEN + 1]; /* Hexadecimal representation of the negotiated Session-ID. */ data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cert_algo[MAX_ALGORITHM_LEN]; /* Certificate's asymmetric cryptography algorithm. */ data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subject[MAX_X509_LEN]; /* To whom the certificate belongs? */ data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:108:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char issuer[MAX_X509_LEN]; /* CA who issued the certificate. */ data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:109:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char not_before[MAX_TIME_STRLEN]; /* Date before which the certificate is not valid. */ data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:110:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char not_after[MAX_TIME_STRLEN]; /* Date after which the certificate is not valid. */ data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tlsid[MAX_TLSID_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:45:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char dl_err[MAX_ERRSTR_LEN]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:46:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:74:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *err_str, libpath[GTM_PATH_MAX], util_libpath[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_libpath_env[GTM_PATH_MAX], *save_libpath_ptr, plugin_dir_path[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char save_libpath[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_tparm.c:25:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char gtm_tparm_buf[64]; /* static so it can be returned, room for expanded escape sequence */ data/fis-gtm-6.3-007/sr_unix/gtm_tparm.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebcdicbuf[32]; /* ESC_LEN in io.h is 16, allow extra */ data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:307:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rtnname[GTM_PATH_MAX], rtnname_template[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:308:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char objname[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:309:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zcomp_parms[(GTM_PATH_MAX * 2) + SIZEOF(mident_fixed) + SIZEOF(OBJECT_PARM) + SIZEOF(NAMEOFRTN_PARM) data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:319:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. DBGTRIGR_ONLY(memcpy(rtnname, trigdsc->rtn_desc.rt_name.addr, trigdsc->rtn_desc.rt_name.len)); data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:427:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zcomp_parms_ptr, trigdsc->rtn_desc.rt_name.addr, trigdsc->rtn_desc.rt_name.len); data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:613:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mv_st_ent->mv_st_cont.mvs_trigr.savextref.addr, extnam_str.addr, extnam_str.len); data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:681:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(extnam_str.addr, mv_st_ent->mv_st_cont.mvs_trigr.savextref.addr, extnam_str.len); data/fis-gtm-6.3-007/sr_unix/gtm_utf8.c:267:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char errtxt[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/gtm_zlib.c:34:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtm_zlib.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_msg[MAX_ERRSTR_LEN]; data/fis-gtm-6.3-007/sr_unix/gtm_zlib.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aix_err_msg[MAX_ERRSTR_LEN]; data/fis-gtm-6.3-007/sr_unix/gtm_zlib.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char librarypath[GTM_PATH_MAX], *lpath = NULL; data/fis-gtm-6.3-007/sr_unix/gtmci.c:104:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmci.c:901:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtm_char_ptr, arg_ptr->str.addr, arg_ptr->str.len); data/fis-gtm-6.3-007/sr_unix/gtmci.c:908:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mstr_parm->address, arg_ptr->str.addr, mstr_parm->length); data/fis-gtm-6.3-007/sr_unix/gtmci.c:1028:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtmsecshr_path[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmci.c:1031:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_perm[MAX_PERM_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmci.c:1064:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtmsecshr_path, gtm_dist, dist_len); data/fis-gtm-6.3-007/sr_unix/gtmci.c:1066:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtmsecshr_path + dist_len + 1, GTMSECSHR_EXECUTABLE, STRLEN(GTMSECSHR_EXECUTABLE)); data/fis-gtm-6.3-007/sr_unix/gtmci.c:1084:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtm_dist, dist, dist_len); data/fis-gtm-6.3-007/sr_unix/gtmci.c:1202:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg, dollar_zstatus.str.addr, msg_len); data/fis-gtm-6.3-007/sr_unix/gtmci_ch.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src_buf[MAX_ENTRYREF_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmci_isv.c:63:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dollar_ecode, &dollar_ecode_ci, SIZEOF(dollar_ecode)); data/fis-gtm-6.3-007/sr_unix/gtmci_isv.c:64:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dollar_stack, &dollar_stack_ci, SIZEOF(dollar_stack)); data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h:175:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((DST)->encryption_hash, (SRC)->encryption_hash, GTMCRYPT_HASH_LEN); \ data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h:176:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((DST)->encryption_hash2, (SRC)->encryption_hash2, GTMCRYPT_HASH_LEN); \ data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h:356:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(HASH, hash_string.address, hash_string.length); \ data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h:465:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. c = ((char *)INBUF)[i]; \ data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h:482:46: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. c = ((OUTBUF == NULL) ? (char *)INBUF : (char *)(OUTBUF))[i]; \ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:85:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((*target_node)->FIELD, VALUE, LENGTH); \ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:106:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATICDEF char gc_config_filename[GTM_PATH_MAX]; /* Path to the configuration file. */ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:116:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATICDEF char path_array[GTM_PATH_MAX]; /* Array for temporary storage of keys or data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:118:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATICDEF unsigned char key_hash_array[GTMCRYPT_HASH_LEN]; /* Array for temporary storage of keys' data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:182:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char save_err[MAX_GTMCRYPT_ERR_STRLEN + 1], hex_buff[GTMCRYPT_HASH_HEX_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:207:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_err, gtmcrypt_err_string, errorlen); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lcl_keyname[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:376:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *lcl_key_name, lcl_key_name_buff[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:377:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_search_field_buff[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:403:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name_search_field_buff, search_field1, search_field_len - STRLEN(EXT_NEW)); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:545:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char raw_key[SYMMETRIC_KEY_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:581:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(node->key, raw_key, SYMMETRIC_KEY_MAX); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:846:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char iv_array[GTMCRYPT_IV_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:849:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iv_array, iv, length); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:855:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->iv, iv_array, GTMCRYPT_IV_LEN); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:88:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char key[SYMMETRIC_KEY_MAX]; /* Raw symmetric key contents. */ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:89:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char key_hash[GTMCRYPT_HASH_LEN]; /* SHA-512 hash of symmetric key. */ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:90:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_path[GTM_PATH_MAX]; /* Path to the key file. */ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:106:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char iv[GTMCRYPT_IV_LEN]; /* Initialization vector. */ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_name[GTM_PATH_MAX]; /* Logical entity that the symmetric key data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:143:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_name[GTM_PATH_MAX]; /* Logical entity that the symmetric key data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_path[GTM_PATH_MAX]; /* Path to the key file. */ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:53:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char dl_err[MAX_ERRSTR_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:54:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *bufptr, *ptr, cmpptr[GTM_PATH_MAX], buf[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_libpath_env[GTM_PATH_MAX], *save_libpath_ptr, save_libpath[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char libpath[GTM_PATH_MAX], buf[MAX_GTMCRYPT_PLUGIN_STR_LEN], plugin_dir_path[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:140:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved_libpath[GTM_PATH_MAX], resolved_plugin_dir_path[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lclarray[8192]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char null_buffer[SYMMETRIC_KEY_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname[GTM_PATH_MAX], *ptr; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h:112:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(in_buff, symmetric_key, SYMMETRIC_KEY_MAX); \ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h:113:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(in_buff + SYMMETRIC_KEY_MAX, UNIQ_ENC_PARAM_STRING, UNIQ_ENC_PARAM_LEN); \ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h:119:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in_buff[HASH_INPUT_BUFF_LEN]; \ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h:128:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in_buff[HASH_INPUT_BUFF_LEN]; \ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[GTM_PATH_MAX], real_db_path[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:169:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(filename, db_path.address, db_path.length); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:217:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:225:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(keyname, key_name.address, key_name.length); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:251:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[GTM_PATH_MAX], real_db_path[GTM_PATH_MAX], real_key_path[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:259:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(filename, db_path.address, db_path.length); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:270:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(filename, key_path.address, key_path.length); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:346:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char iv_array[GTMCRYPT_IV_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:358:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iv_array, iv.address, iv.length); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char gtmcrypt_err_string[MAX_GTMCRYPT_ERR_STRLEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:144:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tty_copy, &old_tty, SIZEOF(struct termios)); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:227:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[GTM_PASSPHRASE_MAX], mumps_exe[GTM_PATH_MAX], hash_in[GTM_PASSPHRASE_MAX], hash[GTMCRYPT_HASH_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:237:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 != (fd = open(ptr, O_RDONLY))) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:299:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *env_name, *env_value, *passwd, *lpasswd, tmp_passwd[GTM_PASSPHRASE_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h:216:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char env_name[PASSPHRASE_ENVNAME_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h:228:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtmcrypt_err_string[MAX_GTMCRYPT_ERR_STRLEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtmlink.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_KEYWORD_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmrecv.c:71:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmrecv.c:113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char print_msg[REPL_MSG_SIZE], tmpmsg[REPL_MSG_SIZE]; data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:199:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char log_file[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:224:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter_cmd[MAX_FILTER_CMD_LEN]; /* Receiver filters incoming records using this process */ data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char log_file[MAX_FN_LEN + 1]; /* File to log receiver progress */ data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statslog_file[MAX_FN_LEN + 1]; /* File to log statistics */ data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:249:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_GSEC_KEY_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:251:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[3]; data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:370:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char log_file[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:371:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char updresync_instfilename[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:372:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter_cmd[MAX_FILTER_CMD_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reuse_instname[MAX_INSTNAME_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmrecv_fetchresync.c:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seq_num_str[32], *seq_num_ptr; data/fis-gtm-6.3-007/sr_unix/gtmrecv_fetchresync.c:289:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(old_instinfo_msg.instname, jnlpool->repl_inst_filehdr->inst_info.this_instname, data/fis-gtm-6.3-007/sr_unix/gtmrecv_fetchresync.c:304:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&need_instinfo_msg, &msg, MIN_REPL_MSGLEN); data/fis-gtm-6.3-007/sr_unix/gtmrecv_fetchresync.c:404:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msgp, &msg, MIN_REPL_MSGLEN); data/fis-gtm-6.3-007/sr_unix/gtmrecv_poll_actions.c:233:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&xoff_msg.msg[0], (uchar_ptr_t)&send_seqno, SIZEOF(seq_num)); data/fis-gtm-6.3-007/sr_unix/gtmrecv_poll_actions.c:239:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&xoff_msg.msg[0], (uchar_ptr_t)&temp_send_seqno, SIZEOF(seq_num)); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:394:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char print_msg[1024]; data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:619:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&xoff_msg.msg[0], (uchar_ptr_t)&upd_proc_local->read_jnl_seqno, SIZEOF(seq_num)); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:625:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&xoff_msg.msg[0], (uchar_ptr_t)&temp_seq_num, SIZEOF(seq_num)); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:646:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&xon_msg.msg[0], (uchar_ptr_t)&upd_proc_local->read_jnl_seqno, SIZEOF(seq_num)); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:652:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&xon_msg.msg[0], (uchar_ptr_t)&temp_seq_num, SIZEOF(seq_num)); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:682:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char print_msg[1024]; data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:865:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(repl_filter_buff, old_filter_buff, repl_filter_bufsiz); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1367:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(instinfo_msg.instname, inst_hdr->inst_info.this_instname, MAX_INSTNAME_LEN - 1); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1417:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnlpool->jnlpool_ctl->primary_instname, need_instinfo_msg->instname, MAX_INSTNAME_LEN - 1); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1422:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[ONLN_RLBK_CMD_MAXLEN + 1], *errptr; data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1521:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(histinfo1_msg.instname, cur_histinfo->root_primary_instname, MAX_INSTNAME_LEN - 1); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1633:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(recvpool.recvdata_base + write_loc, databuff, datalen); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1836:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(repl_filter_buff, recvpool.recvdata_base + write_off, write_len); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1980:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((sm_uc_ptr_t)&old_triple_content, (recvpool.recvdata_base + write_off), data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1991:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cur_histinfo->root_primary_instname, old_triple_content.instname, MAX_INSTNAME_LEN - 1); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2154:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&recvpool_ctl->last_rcvd_strm_histinfo[histinfo_strm_num], data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2171:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&recvpool_ctl->last_valid_histinfo, data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2184:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&recvpool_ctl->last_valid_strm_histinfo[idx], data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2242:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char print_msg[1024]; data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2585:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(histinfo, &recvpool_ctl->last_valid_histinfo, SIZEOF(repl_histinfo)); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2589:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(histinfo, &recvpool_ctl->last_valid_strm_histinfo[0], SIZEOF(repl_histinfo)); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2640:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&recvpool_ctl->last_rcvd_strm_histinfo[need_histinfo_strm_num], histinfo, SIZEOF(repl_histinfo)); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2766:77: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert((NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3076:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtmrecv_cmpmsgp + gtmrecv_cur_cmpmsglen, old_buffp, buffered_data_len); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3122:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(heartbeat.ack_seqno, buffp - msg_len, msg_len); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3128:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&ack_seqno, data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3133:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&temp_ack_seqno, data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3144:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&heartbeat.ack_seqno[0], data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3152:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&heartbeat.ack_seqno[0], data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3200:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(old_instinfo_msg.instname, data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3221:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnlpool->jnlpool_ctl->primary_instname, old_need_instinfo_msg->instname, data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3402:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&recvd_jnl_seqno, data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:106:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:306:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *name_ptr, *rndir, *cp, realpathbef[GTM_PATH_MAX], *realpathaft, gtmdist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:358:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(realpathbef, rndir, rndirln); /* Need to copy before we modify it */ data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:370:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(realpathaft + rndirln, GTMSECSHR_DIR_SUFFIX, SIZEOF(GTMSECSHR_DIR_SUFFIX)); /* includes null terminator */ data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:989:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char procpath[GTM_PATH_MAX], cmdbuf[GTM_PATH_MAX], rpcmdbuf[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:998:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ppptr, PROCPATH_CMDLSUFFIX, SIZEOF(PROCPATH_CMDLSUFFIX)); /* Copy includes terminating null of literal */ data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:1041:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ppptr_save, PROCPATH_MAPSSUFFIX, SIZEOF(PROCPATH_MAPSSUFFIX)); /* Copy includes terminating null of literal */ data/fis-gtm-6.3-007/sr_unix/gtmsecshr.h:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr.h:104:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:49:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:54:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char gtmsecshr_sockpath[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:55:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char gtmsecshr_path[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:175:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char id_str[MAX_ID_LEN+1], suffix; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:176:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pid_str[2 * SIZEOF(pid_t) + 1]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:191:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtmsecshr_cli_sock_name.sun_path, gtmsecshr_sockpath, gtmsecshr_sockpath_len); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:197:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtmsecshr_sockpath + gtmsecshr_sockpath_len, (char *)id_str, id_str_len); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:200:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtmsecshr_sock_name.sun_path, gtmsecshr_sockpath, gtmsecshr_sockpath_len); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtm_dist_val[MAX_ENV_VAR_VAL_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:174:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtm_tmp_val[MAX_ENV_VAR_VAL_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtm_secshrdir_path[MAX_ENV_VAR_VAL_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:176:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtm_secshrdir_path_display[MAX_ENV_VAR_VAL_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:177:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtm_secshr_path[MAX_ENV_VAR_VAL_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:178:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtm_secshr_path_display[MAX_ENV_VAR_VAL_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtm_secshr_orig_path[MAX_ENV_VAR_VAL_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gtm_TZ_val[MAX_ENV_VAR_VAL_LEN + 1], *gtm_TZ_val_ptr; data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:208:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gtm_white_box_test_case_enabled = atoi(env_var_ptr); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:213:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gtm_white_box_test_case_number = atoi(env_var_ptr); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:229:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). envfile = fopen(environfile, "r"); data/fis-gtm-6.3-007/sr_unix/gtmsource.c:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char print_msg[OUT_BUFF_SIZE - 1], tmpmsg[REPL_MSG_SIZE]; data/fis-gtm-6.3-007/sr_unix/gtmsource.c:346:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_unix/gtmsource.h:203:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char primary_instname[MAX_INSTNAME_LEN];/* Name of the primary instance this secondary instance is data/fis-gtm-6.3-007/sr_unix/gtmsource.h:222:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char freeze_comment[MAX_FREEZE_COMMENT_LEN]; /* Text explaining reason for freeze */ data/fis-gtm-6.3-007/sr_unix/gtmsource.h:224:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char merrors_array[MERRORS_ARRAY_SZ]; data/fis-gtm-6.3-007/sr_unix/gtmsource.h:228:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_16bytealign1[8]; data/fis-gtm-6.3-007/sr_unix/gtmsource.h:419:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char secondary_instname[MAX_INSTNAME_LEN];/* Name of the secondary instance that is connected */ data/fis-gtm-6.3-007/sr_unix/gtmsource.h:426:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char filler1_align_8[4]; data/fis-gtm-6.3-007/sr_unix/gtmsource.h:459:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secondary_host[MAX_HOST_NAME_LEN]; /* hostname of the secondary */ data/fis-gtm-6.3-007/sr_unix/gtmsource.h:469:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char log_file[MAX_FN_LEN + 1]; /* log file name */ data/fis-gtm-6.3-007/sr_unix/gtmsource.h:472:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statslog_file[MAX_FN_LEN + 1]; /* stats log file name */ data/fis-gtm-6.3-007/sr_unix/gtmsource.h:477:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter_cmd[MAX_FILTER_CMD_LEN]; /* command to run to invoke the external filter (if needed) */ data/fis-gtm-6.3-007/sr_unix/gtmsource.h:535:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_8byte_align[4]; data/fis-gtm-6.3-007/sr_unix/gtmsource.h:681:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter_cmd[MAX_FILTER_CMD_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsource.h:682:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secondary_host[MAX_HOST_NAME_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsource.h:683:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char log_file[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtmsource.h:684:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secondary_instname[MAX_INSTNAME_LEN]; /* instance name specified in -INSTSECONDARY qualifier */ data/fis-gtm-6.3-007/sr_unix/gtmsource.h:685:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char freeze_comment[MAX_FREEZE_COMMENT_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsource.h:687:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tlsid[MAX_TLSKEY_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsource_checkhealth.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errtxt[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/gtmsource_flush_fh.c:35:98: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open); data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_connect_parms_str[GTMSOURCE_CONN_PARMS_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char freeze_comment[SIZEOF(gtmsource_options.freeze_comment)]; data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char freeze_val[SIZEOF("OFF")]; /* "ON" or "OFF", including null terminator */ data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:72:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inst_name[MAX_FN_LEN + 1], *ip_end, *strtokptr; data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secondary_sys[MAX_SECONDARY_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:74:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statslog_val[SIZEOF("OFF")]; /* "ON" or "OFF" */ data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char update_val[SIZEOF("DISABLE")]; /* "ENABLE" or "DISABLE" */ data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:161:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtmsource_options.secondary_instname, inst_name, inst_name_len + 1); /* copy terminating '\0' as well */ data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:186:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtmsource_options.secondary_host, c, index); data/fis-gtm-6.3-007/sr_unix/gtmsource_heartbeat.c:138:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char seq_num_str[32], *seq_num_ptr; data/fis-gtm-6.3-007/sr_unix/gtmsource_heartbeat.c:152:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(overdue_heartbeat, &heartbeat_element->heartbeat, SIZEOF(repl_heartbeat_msg_t)); data/fis-gtm-6.3-007/sr_unix/gtmsource_heartbeat.c:172:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char seq_num_str[32], *seq_num_ptr; data/fis-gtm-6.3-007/sr_unix/gtmsource_heartbeat.c:227:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char seq_num_str[32], *seq_num_ptr; data/fis-gtm-6.3-007/sr_unix/gtmsource_mode_change.c:111:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&jnlpool->gtmsource_local->connect_parms[0], >msource_options.connect_parms[0], data/fis-gtm-6.3-007/sr_unix/gtmsource_process.c:388:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_string[1024]; data/fis-gtm-6.3-007/sr_unix/gtmsource_process.c:662:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_string[1024]; data/fis-gtm-6.3-007/sr_unix/gtmsource_process.c:685:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char histdetail[OUT_LINE]; data/fis-gtm-6.3-007/sr_unix/gtmsource_process.c:695:98: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char print_msg[PROC_OPS_PRINT_MSG_LEN], msg_str[1024], *errmsg; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:339:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(repl_filter_buff, old_filter_buff, repl_filter_bufsiz); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:371:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char *)gtmsource_msgp, (unsigned char *)oldmsgp, gtmsource_msgbufsiz); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:419:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char seq_num_str[32], *seq_num_ptr, *buffp; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:455:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffp, &msg, MIN_REPL_MSGLEN); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:540:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)recvd_jnl_seqno, (uchar_ptr_t)&msg.msg[0], SIZEOF(seq_num)); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:635:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&xoff_ack.msg[0], (uchar_ptr_t)recvd_jnl_seqno, SIZEOF(seq_num)); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:665:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char seq_num_str[32], *seq_num_ptr; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:864:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char seq_num_str[32], *seq_num_ptr; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1005:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_string[1024]; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1069:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_string[1024]; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1158:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)&xoff_ack.msg[0], (uchar_ptr_t)>msource_msgp->msg[0], SIZEOF(seq_num)); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1189:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inputdata[REPL_MSG_CMPDATALEN], cmpbuf[REPL_MSG_CMPEXPDATALEN]; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1244:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(test_msg.data, cmpbuf, test_msg.datalen); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1376:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char print_msg[1024]; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1393:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(old_needinst_msg.instname, jnlpool->repl_inst_filehdr->inst_info.this_instname, MAX_INSTNAME_LEN - 1); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1432:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(needinst_msg.instname, jnlpool->repl_inst_filehdr->inst_info.this_instname, MAX_INSTNAME_LEN - 1); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1500:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_string[1024]; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1547:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(histinfo->root_primary_instname, histinfo1_msg.instname, MAX_INSTNAME_LEN - 1); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1575:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_string[1024]; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1676:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char histdetail[MAX_REPL_OPMSG_LEN]; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1769:98: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1845:98: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1918:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(oldtriple_msg.triplecontent.instname, histinfo.root_primary_instname, MAX_INSTNAME_LEN - 1); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1970:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char histdetail[256]; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1975:98: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open); data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:256:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_string[BUFSIZ]; data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:397:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jnl_fn[JNL_NAME_SIZE]; data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:445:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnl_fn, new_ctl->repl_buff->fc->jfh->prev_jnl_file_name, jnl_fn_len); data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:463:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reg_ctl_end->jnl_fn, jnl_fn, jnl_fn_len); data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:464:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reg_ctl_end->reg->jnl_file_name, jnl_fn, jnl_fn_len); data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:817:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char seq_num_str[32], *seq_num_ptr; /* INT8_PRINT */ data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:936:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *seq_num_ptr, seq_num_str[32]; /* INT8_PRINT */ data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:953:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*buff, b->recbuff, b->reclen); data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:989:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*buff, b->recbuff, b->reclen); data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:996:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tcombuffp, b->recbuff, b->reclen); data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:1466:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *seq_num_ptr, seq_num_str[32]; /* INT8_PRINT */ data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:1554:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, gtmsource_tcombuff_start, tot_tcom_len); data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:1569:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char seq_num_str[32], *seq_num_ptr; /* INT8_PRINT */ data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:1926:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *orig_msgp, seq_num_str[32], *seq_num_ptr; /* INT8_PRINT */ data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:2104:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char seq_num_str[32], *seq_num_ptr; /* INT8_PRINT */ data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:118:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, (sm_uc_ptr_t)jnl_header + SIZEOF(jnldata_hdr_struct), read_size); data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:120:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff + read_size, jnldata_base, wrap_size); data/fis-gtm-6.3-007/sr_unix/gtmsource_rootprimary_init.c:95:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(histinfo.root_primary_instname, jnlpool->repl_inst_filehdr->inst_info.this_instname, MAX_INSTNAME_LEN - 1); data/fis-gtm-6.3-007/sr_unix/gtmsource_seqno_init.c:73:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_unix/gtmsource_srv_latch.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scndry_msg[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:81:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:103:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITREF char ctypetab[NUM_CHARS]; data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:124:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(SAVE_RTN_NAME, TRIGDSC->rtn_desc.rt_name.addr, SAVE_RTN_NAME_LEN); \ data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:131:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(SAVE_VAR_NAME, GVT->gvname.var_name.addr, SAVE_VAR_NAME_LEN); \ data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:186:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst_mstr->addr, addr, len); \ data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:193:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rt_name[MAX_TRIGNAME_LEN], save_var_name[MAX_MIDENT_LEN]; \ data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:222:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char str_buff[MAX_ZWR_KEY_SZ], *str_end; \ data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:421:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keybuff[SIZEOF(gv_key) + DBKEYSIZE(MAX_KEY_SZ)]; data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:499:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dststart, out_key->base, len); data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:512:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dststart, out_key->base, len); data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:528:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dststart, out_key->base, len); data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:563:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char source_buffer[MAX_SRCLINE]; data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:577:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(source_buffer, ptr, len); data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:585:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, pat_ptstr.buff, len); data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:627:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char util_buff[MAX_TRIG_UTIL_LEN]; data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:645:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char save_rtn_name[MAX_TRIGNAME_LEN], save_var_name[MAX_MIDENT_LEN]; data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:980:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lvnamedsc->var_name.addr, ptr_start, len); data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:1473:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *keysub_start[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:1487:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char util_buff[MAX_TRIG_UTIL_LEN]; data/fis-gtm-6.3-007/sr_unix/gv_trigger.h:187:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. DBGTRIGR_ONLY(char gvnamestr[MAX_MIDENT_LEN + 1];) \ data/fis-gtm-6.3-007/sr_unix/gv_trigger.h:207:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. DBGTRIGR_ONLY(memcpy(gvnamestr, GVT->gvname.var_name.addr, GVT->gvname.var_name.len);) \ data/fis-gtm-6.3-007/sr_unix/gv_trigger.h:479:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key, HASHT_GBLNAME, HASHT_GBLNAME_FULL_LEN); /* including terminating '\0' subscript */ \ data/fis-gtm-6.3-007/sr_unix/gv_trigger.h:501:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) \ data/fis-gtm-6.3-007/sr_unix/gv_trigger.h:544:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; \ data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:186:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(now_running, csa->nl->now_running, SIZEOF(now_running)); \ data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:418:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *fnptr, fbuff[MAX_FN_LEN + 1], tmpbuff[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:448:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fbuff, file.addr, file.len); data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:476:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seg->fname, pblk.buffer, pblk.b_esl); data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:548:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuff, seg->fname, seg->fname_len + 1); /* + 1 to include terminating '\0' */ data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:679:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char machine_name[MAX_MCNAMELEN]; data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:704:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char now_running[MAX_REL_NAME]; data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:712:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[JNLBUFFUPDAPNDX_SIZE]; /* JNLBUFFUPDAPNDX_SIZE is defined in jnl.h */ data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1123:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tsdbuff, (sgmnt_data_ptr_t)(TREF(dio_buff)).aligned, SGMNT_HDR_LEN); data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1324:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csd, tsd, SIZEOF(sgmnt_data)); data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1348:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cnl->now_running, gtm_release_name, gtm_release_name_len + 1); /* GT.M release name */ data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1349:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cnl->label, GDS_LABEL, GDS_LABEL_SZ - 1); /* GDS label */ data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1350:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cnl->fname, reg->dyn.addr->fname, reg->dyn.addr->fname_len); /* database filename */ data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1420:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(baseDBreg->open); data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1657:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(db_ipcs.fn, reg->dyn.addr->fname, reg->dyn.addr->fname_len); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_data.c:124:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_kill.c:129:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cumul_key[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c:157:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c:174:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cumul_key[0], &gv_altkey->base[prev], cumul_key_len); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c:200:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_altkey->base[0], &gv_currkey->base[0], prev); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c:201:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_altkey->base[prev], &cumul_key[0], cumul_key_len); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_query.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cumul_key[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_unix/gvcst_spr_query.c:126:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_query.c:141:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cumul_key[0], &gv_altkey->base[0], cumul_key_len); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_query.c:168:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_altkey->base[0], &cumul_key[0], cumul_key_len); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_queryget.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cumul_key[MAX_KEY_SZ]; data/fis-gtm-6.3-007/sr_unix/gvcst_spr_queryget.c:133:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_queryget.c:148:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cumul_key[0], &gv_altkey->base[0], cumul_key_len); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_queryget.c:177:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_altkey->base[0], &cumul_key[0], cumul_key_len); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cumul_key[MAX_KEY_SZ], savech; data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c:161:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c:178:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cumul_key[0], &gv_altkey->base[prev], cumul_key_len); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c:204:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_altkey->base[0], &gv_currkey->base[0], prev); data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c:205:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_altkey->base[prev], &cumul_key[0], cumul_key_len); data/fis-gtm-6.3-007/sr_unix/ident.h:12:38: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define CONVERT_IDENT(to, from, len) memcpy(to, from, len) data/fis-gtm-6.3-007/sr_unix/incr_link.c:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_buf[PATH_MAX + 1], marker[SIZEOF(JSB_MARKER) - 1], *rw_rel_start; data/fis-gtm-6.3-007/sr_unix/incr_link.c:172:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rtnname_buf[MAX_MIDENT_LEN]; data/fis-gtm-6.3-007/sr_unix/incr_link.c:306:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hdr, shdr, SIZEOF(rhdtyp)); data/fis-gtm-6.3-007/sr_unix/incr_link.c:654:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sect_rw_rel, shdr + (INTPTR_T)rw_rel_start, sect_rw_rel_size); data/fis-gtm-6.3-007/sr_unix/incr_link.c:705:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newaddr, hdr->src_full_name.addr, hdr->src_full_name.len); data/fis-gtm-6.3-007/sr_unix/incr_link.c:706:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newaddr + hdr->src_full_name.len, hdr->routine_name.addr, hdr->routine_name.len); data/fis-gtm-6.3-007/sr_unix/incr_link.c:713:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name_buf, hdr->src_full_name.addr, name_buf_len); data/fis-gtm-6.3-007/sr_unix/incr_link.c:724:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sect_rw_nonrel, shdr + (INTPTR_T)hdr->labtab_adr, sect_rw_nonrel_size); data/fis-gtm-6.3-007/sr_unix/incr_link.c:747:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zlink_mname.c[0], hdr->routine_name.addr, hdr->routine_name.len); data/fis-gtm-6.3-007/sr_unix/incr_link.c:767:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&module_name.c[0], hdr->routine_name.addr, hdr->routine_name.len); data/fis-gtm-6.3-007/sr_unix/incr_link.c:982:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&string_size, shdr + hdr->sym_table_off, SIZEOF(string_size)); data/fis-gtm-6.3-007/sr_unix/incr_link.c:1044:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rtnid.c[0], sym_temp, sym_size); data/fis-gtm-6.3-007/sr_unix/incr_link.c:1070:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&labid.c[0], sym_temp, sym_size); data/fis-gtm-6.3-007/sr_unix/io_init_name.c:36:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sys_input.addr,temp, i); data/fis-gtm-6.3-007/sr_unix/io_init_name.c:50:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sys_output.addr,temp, i); data/fis-gtm-6.3-007/sr_unix/io_is_rm.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BUFSIZ]; data/fis-gtm-6.3-007/sr_unix/io_is_rm.c:28:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, name->addr, name->len); data/fis-gtm-6.3-007/sr_unix/io_open_try.c:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *buf, namebuf[LOGNAME_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/io_open_try.c:88:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dev_type[MAX_DEV_TYPE_LEN]; data/fis-gtm-6.3-007/sr_unix/io_open_try.c:106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer[NI_MAXSERV], *port_ptr; data/fis-gtm-6.3-007/sr_unix/io_open_try.c:123:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(namebuf, tn.addr, tn.len); data/fis-gtm-6.3-007/sr_unix/io_open_try.c:285:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sockport=atoi(port_buffer); data/fis-gtm-6.3-007/sr_unix/io_open_try.c:608:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). status = (iod->disp_ptr->open)(naml, pp, file_des, mspace, msec_timeout); data/fis-gtm-6.3-007/sr_unix/iob_read.c:56:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, bf->bptr, bf->remaining); data/fis-gtm-6.3-007/sr_unix/iob_read.c:78:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, bf->bptr, nbytes); data/fis-gtm-6.3-007/sr_unix/iob_write.c:51:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bf->bptr, buf, bf->remaining); data/fis-gtm-6.3-007/sr_unix/iob_write.c:60:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bf->bptr, buf, nbytes); data/fis-gtm-6.3-007/sr_unix/iopi_iocontrol.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char action[MAX_DEVCTL_LENGTH]; data/fis-gtm-6.3-007/sr_unix/iopi_iocontrol.c:99:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d->addr, iod->dollar.key, MIN(len, d->len)); data/fis-gtm-6.3-007/sr_unix/iopi_iocontrol.c:109:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tname[MAX_FIXED_STRING]; data/fis-gtm-6.3-007/sr_unix/iopi_iocontrol.c:170:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d->addr, tname, MIN(len,d->len)); data/fis-gtm-6.3-007/sr_unix/iopi_open.c:53:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/iopi_open.c:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *path, path_buff[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/iopi_open.c:149:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(path_buff, path, path_len + 1); /* + 1 for null */ data/fis-gtm-6.3-007/sr_unix/iopi_open.c:159:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(copy_cmd_string, cmd_string, cmd_string_size); data/fis-gtm-6.3-007/sr_unix/iopi_open.c:171:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(command2, token1, STRLEN(token1) + 1); data/fis-gtm-6.3-007/sr_unix/iopi_open.c:229:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dir_in_path, path, path_len + 1); data/fis-gtm-6.3-007/sr_unix/iopi_open.c:250:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ret_token, token2, STRLEN(token2) + 1); data/fis-gtm-6.3-007/sr_unix/iopi_open.c:297:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *sparams[3] = {0, 0, 0}; data/fis-gtm-6.3-007/sr_unix/iopi_open.c:309:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ret_token[GTM_MAX_DIR_LEN]; data/fis-gtm-6.3-007/sr_unix/iopi_open.c:310:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_str[MAXDEVPARLEN + STR_LIT_LEN(INVALID_CMD2)]; data/fis-gtm-6.3-007/sr_unix/iopi_open.c:382:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pcommand, sparams[PCOMMAND], slen[PCOMMAND]); data/fis-gtm-6.3-007/sr_unix/iopi_open.c:419:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pcommand, filtered_command.address, filtered_command.length); data/fis-gtm-6.3-007/sr_unix/iopi_open.c:439:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pshell, sparams[PSHELL], slen[PSHELL]); data/fis-gtm-6.3-007/sr_unix/iopi_open.c:465:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pstderr, sparams[PSTDERR], slen[PSTDERR]); data/fis-gtm-6.3-007/sr_unix/iopi_open.c:686:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.device, "0", SIZEOF("0")); data/fis-gtm-6.3-007/sr_unix/iorm_close.c:166:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(savepath2, path2, path2len); data/fis-gtm-6.3-007/sr_unix/iorm_get.c:249:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *pad_ptr, *nextmb, padchar, padcharray[2]; data/fis-gtm-6.3-007/sr_unix/iorm_get.c:328:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rm_ptr->inbuf, &rm_ptr->bom_buf[rm_ptr->bom_buf_off], from_bom); data/fis-gtm-6.3-007/sr_unix/iorm_get.c:647:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *pad_ptr, *nextmb, padchar, padcharray[2]; data/fis-gtm-6.3-007/sr_unix/iorm_get.c:714:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rm_ptr->inbuf, &rm_ptr->bom_buf[rm_ptr->bom_buf_off], from_bom); data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:110:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.zb, delimptr, MIN(delimlen, ESC_LEN - 1)); data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:112:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.key, delimptr, MIN(delimlen, DD_BUFLEN - 1)); data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:444:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, buffer_start, bytes_read); data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1122:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, rm_ptr->inbuf_off, v->str.len); data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1255:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rm_ptr->inbuf_pos, &rm_ptr->bom_buf[rm_ptr->bom_buf_off], from_bom); data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1466:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rm_ptr->inbuf_pos, data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1672:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(temp, char_start, char_bytes_read); data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1868:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(io_ptr->dollar.device, "0", SIZEOF("0")); data/fis-gtm-6.3-007/sr_unix/iorm_use.c:193:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seek_str[LIMIT_SEEK_STR]; data/fis-gtm-6.3-007/sr_unix/iorm_use.c:204:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_str[MAX_ERROR_SIZE]; data/fis-gtm-6.3-007/sr_unix/iorm_use.c:738:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seek_str, (char *)(pp->str.addr + p_offset + 1), seek_len); data/fis-gtm-6.3-007/sr_unix/iorm_write.c:119:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *inptr, *top, *nextmb, *outptr, *nextoutptr, *outstart, temppad, temppadarray[2]; data/fis-gtm-6.3-007/sr_unix/iorm_write.c:176:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, UTF16BE_BOM, UTF16BE_BOM_LEN); data/fis-gtm-6.3-007/sr_unix/iorm_write.c:374:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.device, "0", SIZEOF("0")); data/fis-gtm-6.3-007/sr_unix/iorm_wteol.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *outstr, temppad, temppadarray[2], *out_ptr; data/fis-gtm-6.3-007/sr_unix/iormdef.h:264:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char bom_buf[4]; /* Buffer area for BOM assembly */ data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:122:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmsg_buffer[SIZEOF(struct cmsghdr) * 2 + CMSG_SPACE(MAX_PASS_FDS * SIZEOF(int))]; data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char complete_buf[STR_LIT_LEN(ACCEPT_COMPLETE)]; data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:226:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.device, "0", SIZEOF("0")); data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:329:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmsg_buffer[SIZEOF(struct cmsghdr) * 2 + CMSG_SPACE(MAX_PASS_FDS * SIZEOF(int))]; data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char complete_buf[STR_LIT_LEN(PASS_COMPLETE)]; data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:407:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.device, "0", SIZEOF("0")); data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:516:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psocketptr->handle, handlestr.addr, handlestr.len); data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:574:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hptr, handles[0].addr, handles[0].len); data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:579:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hptr, handles[fdn].addr, handles[fdn].len); data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c:43:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char dl_err[MAX_ERRSTR_LEN]; data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char idstr[MAX_TLSID_LEN + SIZEOF(RENEGOTIATE) + 1], optionstr[MAX_TLSOPTION]; data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char passwordstr[GTM_PASSPHRASE_MAX_ASCII + 1]; data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c:168:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.device, "0", SIZEOF("0")); data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c:217:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(extraptr, tlsid->str.addr, tlsid->str.len); data/fis-gtm-6.3-007/sr_unix/iott_edit.c:48:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *str, string[TTDEF_BUF_SZ], *outptr, *outtop; data/fis-gtm-6.3-007/sr_unix/iott_edit.c:119:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *str, string[TTDEF_BUF_SZ], *outptr, *outtop, *strstart, *nextptr; data/fis-gtm-6.3-007/sr_unix/iott_edit.c:407:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char string[1024]; data/fis-gtm-6.3-007/sr_unix/iott_iocontrol.c:46:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d->addr, iod->dollar.key, len); data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:79:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char more_buf[GTM_MB_LEN_MAX + 1], *more_ptr; /* to build up multi byte for character */ data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:121:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(more_buf, tt_state->more_buf, SIZEOF(more_buf)); data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:194:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tt_state->more_buf, more_buf, SIZEOF(more_buf)); data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:506:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tt_ptr->recall_buff.addr, &INPUT_CHAR, SIZEOF(INPUT_CHAR)); data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:539:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(io_ptr->dollar.key, io_ptr->dollar.zb, (zb_ptr - io_ptr->dollar.zb)); data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:81:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char eraser[3] = { NATIVE_BS, NATIVE_SP, NATIVE_BS }; data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:130:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.zb, delimptr, MIN(delimlen, ESC_LEN - 1)); data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:132:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iod->dollar.key, delimptr, MIN(delimlen, DD_BUFLEN - 1)); data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:148:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char more_buf[GTM_MB_LEN_MAX + 1], *more_ptr; /* to build up multi byte for character */ data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:225:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(more_buf, tt_state->more_buf, SIZEOF(more_buf)); data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:362:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tt_state->more_buf, more_buf, SIZEOF(more_buf)); data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:1118:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(io_ptr->dollar.key, io_ptr->dollar.zb, (zb_ptr - io_ptr->dollar.zb)); data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:1166:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tt_ptr->recall_buff.addr, BUFF_ADDR(0), BUFF_CHAR_SIZE * outlen); data/fis-gtm-6.3-007/sr_unix/iott_use.c:53:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LITDEF unsigned char filter_index[27] = data/fis-gtm-6.3-007/sr_unix/iott_use.c:312:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mask_term.mask[0], (pp->str.addr + p_offset), SIZEOF(io_termmask)); data/fis-gtm-6.3-007/sr_unix/iott_use.c:477:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp_ptr->mask_term, &mask_term, SIZEOF(io_termmask)); data/fis-gtm-6.3-007/sr_unix/iott_write.c:67:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)tt_ptr->tbuffp, text, textlen); data/fis-gtm-6.3-007/sr_unix/iottdef.h:90:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char escape_sequence[ESC_LEN]; /* dm_read only */ data/fis-gtm-6.3-007/sr_unix/iottdef.h:91:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char more_buf[GTM_MB_LEN_MAX + 1]; data/fis-gtm-6.3-007/sr_unix/ious_open.c:39:51: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). else if (!(((d_us_struct*)(iod->dev_sp))->disp->open)) data/fis-gtm-6.3-007/sr_unix/ious_open.c:44:53: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ((void(*)())(((d_us_struct*)(iod->dev_sp))->disp->open))(); data/fis-gtm-6.3-007/sr_unix/ipcrmid.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[128]; data/fis-gtm-6.3-007/sr_unix/ipcrmid.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[128]; data/fis-gtm-6.3-007/sr_unix/jnl_file_close_timer.c:67:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!r_local->open || r_local->was_open) data/fis-gtm-6.3-007/sr_unix/jnl_file_extend.c:66:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hdr_buff[REAL_JNL_HDR_LEN + MAX_IO_BLOCK_SIZE]; data/fis-gtm-6.3-007/sr_unix/jnl_file_extend.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prev_jnl_fn[JNL_NAME_SIZE]; data/fis-gtm-6.3-007/sr_unix/jnl_file_extend.c:244:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dio_buff)).aligned, csd, SGMNT_HDR_LEN); data/fis-gtm-6.3-007/sr_unix/jnl_file_open.c:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char instfilename[MAX_FN_LEN + 1], machine_name[MAX_MCNAMELEN], scndry_msg[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:311:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)seg->fname, instfilename, full_len); data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:680:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnlpool->repl_inst_filehdr, &repl_instance, REPL_INST_HDR_SIZE); /* Initialize FILE HEADER */ data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:1096:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnlpool->jnlpool_ctl->jnlpool_id.instfilename, seg->fname, seg->fname_len); data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:1098:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnlpool->jnlpool_ctl->jnlpool_id.label, GDS_RPL_LABEL, GDS_LABEL_SZ); data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:1099:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnlpool->jnlpool_ctl->jnlpool_id.now_running, gtm_release_name, gtm_release_name_len + 1); data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:1199:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtmsourcelocal_ptr->secondary_instname, gtmsource_options.secondary_instname, MAX_INSTNAME_LEN - 1); data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:1250:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(repl_inst_name, repl_instance.inst_info.this_instname, MAX_INSTNAME_LEN); data/fis-gtm-6.3-007/sr_unix/jobchild_init.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char run_file_name[FILE_NAME_SIZE + 2], *c; data/fis-gtm-6.3-007/sr_unix/jobsp.h:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_JOBPARM_LEN]; data/fis-gtm-6.3-007/sr_unix/jobsp.h:153:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[MAX_JOB_LEN]; data/fis-gtm-6.3-007/sr_unix/list_file.c:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char print_time_buf[20]; data/fis-gtm-6.3-007/sr_unix/list_file.c:47:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char v_width[SIZEOF(int4)]; data/fis-gtm-6.3-007/sr_unix/list_file.c:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char chsetebcdic[8]; data/fis-gtm-6.3-007/sr_unix/list_file.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char charspace, cp, fname[MAX_FN_LEN + 1], list_name[MAX_MIDENT_LEN + STR_LIT_LEN(LISTEXT)], *p; data/fis-gtm-6.3-007/sr_unix/list_file.c:84:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(list_name, &source_file_name[cp], pblk.def1_size); data/fis-gtm-6.3-007/sr_unix/list_file.c:109:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (print_time_buf, p + 4, SIZEOF(print_time_buf)); data/fis-gtm-6.3-007/sr_unix/list_file.c:133:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char page_no_buf[10]; data/fis-gtm-6.3-007/sr_unix/list_file.c:216:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[8]; data/fis-gtm-6.3-007/sr_unix/lke_fileio.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ofnamebuf[1024]; data/fis-gtm-6.3-007/sr_unix/lke_getansw.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[11], *bp; data/fis-gtm-6.3-007/sr_unix/make_mode.c:90:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char dyn_modes_type[2][3] = { data/fis-gtm-6.3-007/sr_unix/map_sym.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_TRANS_NAME_LEN]; data/fis-gtm-6.3-007/sr_unix/maskpass.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char passwd[GTM_PASSPHRASE_MAX], hex_out[GTM_PASSPHRASE_MAX * 2], mumps_exe[GTM_PATH_MAX], *env_ptr; data/fis-gtm-6.3-007/sr_unix/mem_access.c:16:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void set_noaccess(unsigned char *na_page[2], unsigned char *prvprt) data/fis-gtm-6.3-007/sr_unix/mem_access.c:28:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void reset_access(unsigned char *na_page[2], unsigned char oldprt) data/fis-gtm-6.3-007/sr_unix/mmrhash.c:144:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, key, len); data/fis-gtm-6.3-007/sr_unix/mmrhash.c:237:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, key, len); data/fis-gtm-6.3-007/sr_unix/mmrhash.c:369:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, key, len); data/fis-gtm-6.3-007/sr_unix/mmrhash.c:796:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char bytes[16], n; data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:163:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_FN_LEN + 1], errbuff[OUT_LINE]; data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:164:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[DISK_BLOCK_SIZE]; data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:177:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash[GTMCRYPT_HASH_LEN]; data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:366:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cs_data->encryption_hash, hash, GTMCRYPT_HASH_LEN); data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:420:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(baseDBreg->open); data/fis-gtm-6.3-007/sr_unix/mu_decrypt.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash[GTMCRYPT_HASH_LEN], iv[GTM_MAX_IV_LEN], *iv_ptr, *buff, *buff_ptr; data/fis-gtm-6.3-007/sr_unix/mu_decrypt.c:229:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hash, jfh->encryption_hash, GTMCRYPT_HASH_LEN); data/fis-gtm-6.3-007/sr_unix/mu_decrypt.c:233:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hash, dfh->encryption_hash, GTMCRYPT_HASH_LEN); data/fis-gtm-6.3-007/sr_unix/mu_extract.c:108:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATICDEF char outfilename[256]; data/fis-gtm-6.3-007/sr_unix/mu_extract.c:143:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, val.str.addr, val.str.len); \ data/fis-gtm-6.3-007/sr_unix/mu_extract.c:173:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char delete_params[2] = { (unsigned char)iop_delete, (unsigned char)iop_eol }; data/fis-gtm-6.3-007/sr_unix/mu_extract.c:203:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format_buffer[FORMAT_STR_MAX_SIZE], ch_set_name[MAX_CHSET_NAME + 1], cli_buff[MAX_LINE], data/fis-gtm-6.3-007/sr_unix/mu_extract.c:296:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(format_buffer, ZWR_FORMAT_STRING, n_len); data/fis-gtm-6.3-007/sr_unix/mu_extract.c:337:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open) data/fis-gtm-6.3-007/sr_unix/mu_extract.c:358:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open) data/fis-gtm-6.3-007/sr_unix/mu_extract.c:394:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curr_hash_ptr, csd->encryption_hash, GTMCRYPT_HASH_LEN); data/fis-gtm-6.3-007/sr_unix/mu_extract.c:400:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curr_hash_ptr, csd->encryption_hash2, GTMCRYPT_HASH_LEN); data/fis-gtm-6.3-007/sr_unix/mu_extract.c:478:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, val.str.addr, val.str.len); data/fis-gtm-6.3-007/sr_unix/mu_extract.c:497:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&outptr[label_len], label_buff, buflen); data/fis-gtm-6.3-007/sr_unix/mu_getlst.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *c1, *c2, *c3, *c4, fbuff[GTM_PATH_MAX], rbuff[GTM_PATH_MAX], fnbuff[GTM_PATH_MAX + 1]; data/fis-gtm-6.3-007/sr_unix/mu_gvis.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_buff[MAX_ZWR_KEY_SZ], *key_end; data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[MAX_TRANS_NAME_LEN]; /* buffer to hold translated name */ data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:109:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *buf, namebuf[LOGNAME_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:126:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(namebuf, tn.addr, tn.len); data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:392:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). status = (iod->disp_ptr->open)(naml, pp, file_des, mspace, NO_M_TIMEOUT); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:74:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ipcs_buff[MAX_IPCS_ID_BUF], *ipcs_ptr; \ data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:144:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ipcs_buff[MAX_IPCS_ID_BUF], *ipcs_ptr; data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:199:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[MAX_ENTRY_LEN]; data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:259:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgbuff[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:277:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fname, nl_addr->fname, MAX_FN_LEN + 1); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:423:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgbuff[OUT_BUFF_SIZE], *instfilename; data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:440:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)replpool_id, (void *)start_addr, SIZEOF(replpool_identifier)); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:669:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[MAX_ENTRY_LEN]; data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:671:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[MAX_FN_LEN + 1], *fgets_res; data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:137:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(BUFF, TSD, TSD_SIZE); \ data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:322:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char now_running[MAX_REL_NAME]; data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:354:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char basedb_fname[MAX_FN_LEN + 1], statsdb_fname[MAX_FN_LEN + 1], *statsdb_fname_ptr; data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:460:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tsd, buff, tsd_size); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:503:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(basedb_fname, tsd->basedb_fname, basedb_fname_len + 1); /* copy trailing '\0' too */ data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:510:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(baseDBseg->fname, basedb_fname, basedb_fname_len + 1); /* copy trailing '\0' too */ data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:533:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(statsDBudi, udi, SIZEOF(*udi)); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:971:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(now_running, cnl->now_running, MAX_REL_NAME); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.c:94:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ipcs_buff[MAX_IPCS_ID_BUF], *ipcs_ptr; data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.c:145:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)reg->dyn.addr->fname, instfilename, reg->dyn.addr->fname_len + 1); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.c:355:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jnlpool->repl_inst_filehdr, &repl_instance, SIZEOF(repl_inst_hdr)); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_replpool.c:108:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)replpool_id, (void *)start_addr, SIZEOF(replpool_identifier)); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_replpool.c:171:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(repl_inst_filehdr, jnlpool->repl_inst_filehdr, SIZEOF(repl_inst_hdr)); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_rlnkctl.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char objdir[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/mu_signal_process.c:32:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[256]; data/fis-gtm-6.3-007/sr_unix/mu_size_scan.c:123:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gv_target->hist.h[0], &gv_target->hist.h[nLevl], SIZEOF(srch_blk_status)); data/fis-gtm-6.3-007/sr_unix/mu_size_scan.c:242:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sibhist.h[0], &gv_target->hist.h[lvl], SIZEOF(srch_blk_status) * (gv_target->hist.depth - lvl + 2)); data/fis-gtm-6.3-007/sr_unix/mu_size_scan.c:250:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_target->alt_hist, &gv_target->hist, SIZEOF(srch_hist)); /* take a copy of most recently validated history */ data/fis-gtm-6.3-007/sr_unix/mu_swap_root.c:362:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(saved_blk, child_blk_ptr, child_blk_size); data/fis-gtm-6.3-007/sr_unix/mu_trig_trgfile.c:51:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cli_lex_in_ptr_save->in_str, cli_lex_in_ptr->in_str, cli_lex_in_ptr->buflen); data/fis-gtm-6.3-007/sr_unix/mu_truncate.c:109:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_unix/mubexpfilnam.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_mstr_addr[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/mubexpfilnam.c:56:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(list->backup_file.addr, dirname, dirlen); data/fis-gtm-6.3-007/sr_unix/mubexpfilnam.c:57:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(list->backup_file.addr + dirlen, c1, (file.len - (c1 - file.addr))); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpcmd[(MAX_FN_LEN) * 2 + STR_LIT_LEN(UNALIAS) + 1]; \ data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:93:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmpcmd[tmpcmdlen], fulpathcmd[2], cmdpathlen); \ data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:97:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmpcmd[tmpcmdlen], tempdir, tmpdirlen); \ data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:134:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char cmdarray[COMMAND_ARRAY_SIZE], *command = &cmdarray[0]; data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:135:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fulpathcmd[NUM_CMD][MAX_FN_LEN] = {{CP_CMD}, {MV_CMD}, {RMDIR_CMD}}; data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempfilename[MAX_FN_LEN + 1], tempdir[MAX_FN_LEN], prefix[MAX_FN_LEN]; data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:145:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpsrcfname[MAX_FN_LEN], tmpsrcdirname[MAX_FN_LEN], realpathname[PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:178:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tempdir, file->addr, ptr - file->addr + 1); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:187:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prefix, gv_cur_region->rname, gv_cur_region->rname_len); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:228:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpsrcfname, gv_cur_region->dyn.addr->fname, gv_cur_region->dyn.addr->fname_len); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:233:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpsrcdirname, gv_cur_region->dyn.addr->fname, gv_cur_region->dyn.addr->fname_len); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:240:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tempdir, tempfilename, tempfilelen); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:275:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&command[cmdlen], sourcedirname, sourcedirlen); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:281:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&command[cmdlen], fulpathcmd[0], cmdpathlen); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:285:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&command[cmdlen], sourcefilename, sourcefilelen); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:288:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&command[cmdlen], realpathname, realpathlen); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:314:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tempfilename[tempfilelen], sourcefilename, STRLEN(sourcefilename)); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:601:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&command[cmdlen], fulpathcmd[1], cmdpathlen); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:603:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&command[cmdlen], tempfilename, tempfilelen); data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:606:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&command[cmdlen], file->addr, tmplen); data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tcp[5], temp; data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:57:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(list->backup_file.addr, name + 1, len); data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:75:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(list->backup_file.addr, name, len); data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:94:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(list->backup_file.addr, name, len); data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:104:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(directory.addr, name, len); data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:112:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(list->backup_file.addr, name, len); data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:120:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char incbackupfile[MAX_FILENAME_LENGTH]; data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *c, addr[SA_MAXLEN + 1]; data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:224:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(incbackupfile, file->addr, file->len); data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:281:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&outbuf->date[0], val.str.addr, val.str.len); data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:282:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&outbuf->reg[0], gv_cur_region->rname, MAX_RN_LEN); data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:417:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bm_blk_buff, bptr, BM_SIZE(header->bplmap)); data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:479:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data_ptr, bptr, blk_bsiz); data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:752:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[80]; data/fis-gtm-6.3-007/sr_unix/mupip_crypt.c:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[GTM_PATH_MAX], type[32]; /* Type should not be too long */ data/fis-gtm-6.3-007/sr_unix/mupip_cvtgbl.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[MAX_FN_LEN + 1], *line1_ptr, *line3_ptr; data/fis-gtm-6.3-007/sr_unix/mupip_cvtgbl.c:68:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ONERROR_VALUE_LEN]; data/fis-gtm-6.3-007/sr_unix/mupip_cvtgbl.c:95:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fn, sys_input.addr, sys_input.len); data/fis-gtm-6.3-007/sr_unix/mupip_dump_fhead.c:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/mupip_dump_fhead.c:58:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char file[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/mupip_dump_fhead.c:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd_dmpfhead_string[DUMPFHEAD_CMD_STRING_SIZE]; data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:164:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char db_name[MAX_FN_LEN + 1], *t_name; data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:177:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outdb[MAX_FN_LEN + 1], conf_buff[MAX_CONF_RESPONSE + 1], *response; data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:491:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_data, old_data, SIZEOF(sgmnt_data)); data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:909:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *blk_buff[2], *lbmap_buff[2], *errptr; data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:969:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lbmap_buff[buff_new], lbmap_buff[buff_old], bsize); data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:1023:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_buff[buff_new], blk_buff[buff_old], bsize); data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:1242:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pvt_crypt_buf.addr, buff, SIZEOF(blk_hdr)); data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:1354:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char found_gv_key_buff[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_unix/mupip_exit_handler.c:99:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_log[1024]; data/fis-gtm-6.3-007/sr_unix/mupip_ftok.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[MAX_FN_LEN + 1], instfilename[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/mupip_hash.c:32:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hash_hex[32], readbuf[4096]; data/fis-gtm-6.3-007/sr_unix/mupip_load_reg_list.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg_buff[128]; data/fis-gtm-6.3-007/sr_unix/mupip_rctldump.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char objdir[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c:145:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[GTM_PATH_MAX], hash[GTMCRYPT_HASH_LEN]; data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c:381:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csd->encryption_hash2, hash, GTMCRYPT_HASH_LEN); data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c:408:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->encr_key_handle2, &handles[i], SIZEOF(gtmcrypt_key_t)); data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c:502:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bml_lcl_buff, (blk_hdr_ptr_t)bml_sm_buff, BM_SIZE(BLKS_PER_LMAP)); data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c:749:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csd->encryption_hash, csd->encryption_hash2, GTMCRYPT_RESERVED_HASH_LEN); data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char db_name[MAX_FN_LEN + 1], *inbuf, *p, *blk_ptr; data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg_buffer[1024], *newmap; data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:135:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[SA_MAXLEN + 1]; data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:136:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tcp[5]; data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:208:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&old_data, csd, SGMNT_HDR_LEN); data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:607:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dio_buff)).aligned, blk_ptr, size); data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:644:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dio_buff)).aligned, csd, SGMNT_HDR_LEN); data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:680:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(dio_buff)).aligned, inbuf, orig_size); data/fis-gtm-6.3-007/sr_unix/mupip_rundown.c:100:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ipcs_buff[MAX_IPCS_ID_BUF], *ipcs_ptr; data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char acc_spec[MAX_ACC_METH_LEN + 1], *command = "MUPIP SET VERSION", *errptr, exit_stat, *fn, data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:453:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_cur_region->dyn.addr->fname, fn, fn_len); data/fis-gtm-6.3-007/sr_unix/mupip_set_jnlfile.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hdr_buffer[REAL_JNL_HDR_LEN]; data/fis-gtm-6.3-007/sr_unix/mupip_size.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_LINE], cli_buff[MAX_LINE]; data/fis-gtm-6.3-007/sr_unix/mupip_trigger.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trigger_file_name[MAX_FN_LEN + 1], select_list[MAX_LINE], select_file_name[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptr, rename_fn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:153:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mur_options.extr_fn[recstat], jctl->jnl_fn, base_len); data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:155:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mur_options.extr_fn[recstat] + base_len, fn_exten[recstat], fn_exten_size); data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:166:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(file_info->fn, mur_options.extr_fn[recstat], mur_options.extr_fn_len[recstat]); data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:172:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mur_shm_hdr->extr_fn[recstat].fn, file_info->fn, file_info->fn_len); data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:179:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(file_info->fn, mur_shm_hdr->extr_fn[recstat].fn, mur_shm_hdr->extr_fn_len[recstat]); data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:226:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, reg->rname, reg->rname_len); data/fis-gtm-6.3-007/sr_unix/murgetlst.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *c1, *c2, buff[MAX_LINE]; data/fis-gtm-6.3-007/sr_unix/murgetlst.c:48:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr->input_file.addr, c1, c2 - c1); data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mutex_sock_path[MAX_TRANS_NAME_LEN]; data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:65:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pid_str[2 * SIZEOF(pid_t) + 1]; data/fis-gtm-6.3-007/sr_unix/mutex_wake_proc.c:57:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mutex_wake_this_proc_str[2 * SIZEOF(pid_t) + 1]; data/fis-gtm-6.3-007/sr_unix/mutex_wake_proc.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sendtomsg[256]; data/fis-gtm-6.3-007/sr_unix/obj_file.c:52:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char emit_buff[OBJ_EMIT_BUF_SIZE]; /* buffer for emit output */ data/fis-gtm-6.3-007/sr_unix/obj_file.c:126:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, source, size); data/fis-gtm-6.3-007/sr_unix/obj_file.c:135:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(emit_buff + emit_buff_used, source, write); data/fis-gtm-6.3-007/sr_unix/obj_file.c:251:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&newsym->name[0], name->addr, name->len); data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:75:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TADR(tmp_object_file_name), object_fname, object_fname_len); data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:77:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TADR(tmp_object_file_name) + object_fname_len, MKSTEMP_MASK, SIZEOF(MKSTEMP_MASK)); data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obj_name[SIZEOF(mident_fixed) + 5]; data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:142:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj_name[0], module_name.addr, rout_len); data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:143:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj_name[rout_len], DOTOBJ, SIZEOF(DOTOBJ)); /* Includes null terminator */ data/fis-gtm-6.3-007/sr_unix/ojchildioclean.c:54:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (r_local->open && !r_local->was_open && IS_REG_BG_OR_MM(r_local)) data/fis-gtm-6.3-007/sr_unix/ojchildioset.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname_buf[MAX_STDIOE_LEN], buf[MAX_STDIOE_LEN]; data/fis-gtm-6.3-007/sr_unix/ojchildioset.c:82:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(jparms->input_prebuffer, socketptr->buffer + socketptr->buffered_offset, data/fis-gtm-6.3-007/sr_unix/ojchildparms.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parm_string[8]; data/fis-gtm-6.3-007/sr_unix/ojchildparms.c:174:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, arg_msg.data, arg_msg.len); data/fis-gtm-6.3-007/sr_unix/ojchkfs.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char es[MAX_FILSPC_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/ojparams.c:78:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(job_params->params.directory.buffer, p + 1, job_params->params.directory.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:86:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(job_params->params.error.buffer, p + 1, job_params->params.error.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:94:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(job_params->params.gbldir.buffer, p + 1, job_params->params.gbldir.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:102:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(job_params->params.input.buffer, p + 1, job_params->params.input.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:110:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(job_params->params.output.buffer, p + 1, job_params->params.output.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:122:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(job_params->params.startup.buffer, p + 1, job_params->params.startup.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:130:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(job_params->cmdline.buffer, p + 1, job_params->cmdline.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:179:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(job_params->params.input.buffer, definput, job_params->params.input.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:200:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&job_params->params.output.buffer[0], job_params->params.routine.buffer, job_params->params.routine.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:201:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&job_params->params.output.buffer[job_params->params.routine.len], defoutext.addr, defoutext.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:224:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&job_params->params.error.buffer[0], job_params->params.routine.buffer, job_params->params.routine.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:225:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&job_params->params.error.buffer[job_params->params.routine.len], deferrext.addr, deferrext.len); data/fis-gtm-6.3-007/sr_unix/ojparams.c:250:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(job_params->params.gbldir.buffer, dollar_zgbldir.str.addr, dollar_zgbldir.str.len); data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:87:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_STDIOE_LEN]; data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:296:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRLEN]; data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:354:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cbuff[TEMP_BUFF_SIZE], pbuff[TEMP_BUFF_SIZE], cmdbuff[TEMP_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:355:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuff[MAX_MUMPS_EXE_PATH_LEN], tbuff2[MAX_MUMPS_EXE_PATH_LEN], fname_buf[MAX_STDIOE_LEN]; data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:375:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[4]; data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:518:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(params.output.buffer, jparms->params.output.buffer, jparms->params.output.len); data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:521:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(params.error.buffer, jparms->params.error.buffer, jparms->params.error.len); data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:596:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arg_msg.data, jp->parm->str.addr, jp->parm->str.len); data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:789:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tbuff, c1, string_len); data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:812:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmdbuff, jparms->cmdline.buffer, jparms->cmdline.len); data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:159:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p_list, buff_front_boarder, buff_boarder_len); data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:160:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((p_list + len + buff_boarder_len), buff_end_boarder, buff_boarder_len); data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:485:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buffer[MAX_NAME_LENGTH], *tmp_buff_ptr, *jni_err_buf; data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:606:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char param_list_buff[(call_buff_size + 2*buff_boarder_len)]; data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:627:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(free_string_pointer, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:702:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(free_string_pointer, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:800:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_buffer, PACKAGE_ENV_PREFIX, SIZEOF(PACKAGE_ENV_PREFIX)); data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:806:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_buff_ptr, package->str.addr, package->str.len); data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:831:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buffer[MAX_NAME_LENGTH], *tmp_buff_ptr, *xtrnl_table_name; data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:952:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char param_list_buff[(call_buff_size + 2*buff_boarder_len)]; data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:988:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(free_string_pointer, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:1014:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(free_string_pointer, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:1051:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(free_string_pointer, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:1165:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_buffer, PACKAGE_ENV_PREFIX, SIZEOF(PACKAGE_ENV_PREFIX)); data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:1171:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_buff_ptr, package->str.addr, package->str.len); data/fis-gtm-6.3-007/sr_unix/op_fngetjpi.c:34:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef char keyword[MAX_KEY] ; data/fis-gtm-6.3-007/sr_unix/op_fngetjpi.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char upcase[MAX_KEY_LEN]; data/fis-gtm-6.3-007/sr_unix/op_fnpiece.c:73:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(unichar.unibytes_val, del->str.addr, del->str.len); data/fis-gtm-6.3-007/sr_unix/op_fnzparse.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char field_buf[DIR_LEN], type_buf[SYN_LEN], result[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:184:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ar[MAX_DIGITS_IN_INT8], *q; data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:202:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, q, len); data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:214:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ar[MAX_HEX_DIGITS_IN_INT8], *q; data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:228:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, q, fmtlen); data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:243:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuff[MAXNUMLEN + 1]; data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:261:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, zpeekadr, len); data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:443:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mnemonic[NAME_ENTRY_SZ], *nptr, *cptr, *cptrend, *argptr; data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:448:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char argument_uc_buf[ARGUMENT_MAX_LEN]; data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:541:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TADR(zpeek_regname), argptr, arglen); data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:550:50: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((PO_GDRREG != mnemonic_opcode) && !r_ptr->open) data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:553:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!r_ptr->open) data/fis-gtm-6.3-007/sr_unix/op_fnzsearch.c:74:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pblk_buf[GTM_PATH_MAX], sanitized_buf[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/op_fnzsearch.c:297:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_name[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/op_fnzsearch.c:308:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(file_name, res->str.addr, res->str.len); data/fis-gtm-6.3-007/sr_unix/op_fnzsyslog.c:26:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rebuff[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/op_fnzsyslog.c:43:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rebuff, src->str.addr, len); /* Rebuffer to add null terminator */ data/fis-gtm-6.3-007/sr_unix/op_fnzsyslog.c:49:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, &literal_one, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_unix/op_fnztrnlnm.c:55:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_TRANS_NAME_LEN]; data/fis-gtm-6.3-007/sr_unix/op_fnztrnlnm.c:71:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, name->str.addr, name->str.len); data/fis-gtm-6.3-007/sr_unix/op_fnztrnlnm.c:86:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ret->str.addr, status, retlen); data/fis-gtm-6.3-007/sr_unix/op_job.c:105:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[128], *c; data/fis-gtm-6.3-007/sr_unix/op_job.c:115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char combuf[128]; data/fis-gtm-6.3-007/sr_unix/op_job.c:150:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(job_params.params.routine.buffer, routine->str.addr, job_params.params.routine.len); data/fis-gtm-6.3-007/sr_unix/op_job.c:152:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(job_params.params.label.buffer, label->str.addr, job_params.params.label.len); data/fis-gtm-6.3-007/sr_unix/op_job.c:262:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, joberrs[joberr_sig].msg, joberrs[joberr_sig].len); data/fis-gtm-6.3-007/sr_unix/op_job.c:269:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, joberrs[joberr_stp].msg, joberrs[joberr_stp].len); data/fis-gtm-6.3-007/sr_unix/op_setextract.c:109:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(straddr, srcbase, pfxlen); data/fis-gtm-6.3-007/sr_unix/op_setextract.c:119:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(straddr, expr->str.addr, expr->str.len); data/fis-gtm-6.3-007/sr_unix/op_setextract.c:124:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(straddr, srcbase + sfxoff, sfxlen); data/fis-gtm-6.3-007/sr_unix/op_setp1.c:266:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, src->str.addr, pfx_str_len); data/fis-gtm-6.3-007/sr_unix/op_setp1.c:274:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, ldelim.unibytes_val, dlmlen); data/fis-gtm-6.3-007/sr_unix/op_setp1.c:286:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, expr->str.addr, expr->str.len); data/fis-gtm-6.3-007/sr_unix/op_setp1.c:292:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, start_pfx + sfx_start_offset, sfx_str_len); data/fis-gtm-6.3-007/sr_unix/op_setp1.c:321:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cfnpc->pstart[0], &pfnpc->pstart[0], (cfnpc->npcs + 1) * SIZEOF(unsigned int)); data/fis-gtm-6.3-007/sr_unix/op_setpiece.c:87:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(unichar.unibytes_val, del->str.addr, del->str.len); data/fis-gtm-6.3-007/sr_unix/op_setpiece.c:137:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, src->str.addr, first_src_ind); data/fis-gtm-6.3-007/sr_unix/op_setpiece.c:145:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, del->str.addr, del->str.len); data/fis-gtm-6.3-007/sr_unix/op_setpiece.c:154:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, expr->str.addr, expr->str.len); data/fis-gtm-6.3-007/sr_unix/op_setpiece.c:161:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addr, tmp_str, len); data/fis-gtm-6.3-007/sr_unix/op_zedit.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char es[MAX_FN_LEN + 1], typ, *ptr; data/fis-gtm-6.3-007/sr_unix/op_zedit.c:108:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&es[path_len], DOTM, STR_LIT_LEN(DOTM)); data/fis-gtm-6.3-007/sr_unix/op_zedit.c:154:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&es[0], srcdir->str.addr, srcdir->str.len); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:104:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&objnamebuf[objdir->str.len + tslash], module_name.addr, module_name.len); \ data/fis-gtm-6.3-007/sr_unix/op_zlink.c:106:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&objnamebuf[objnamelen], DOTOBJ, SIZEOF(DOTOBJ)); /* Copies null terminator */ \ data/fis-gtm-6.3-007/sr_unix/op_zlink.c:111:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmd_qlf.object_file.str.addr, objnamebuf, objnamelen); \ data/fis-gtm-6.3-007/sr_unix/op_zlink.c:152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *err_code, *fname, data/fis-gtm-6.3-007/sr_unix/op_zlink.c:217:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringpool.free, file.addr, file.len); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:238:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(objnamebuf, file.addr, objnamelen); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:239:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&objnamebuf[objnamelen], DOTOBJ, SIZEOF(DOTOBJ)); /* Copies null terminator */ data/fis-gtm-6.3-007/sr_unix/op_zlink.c:249:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&srcnamebuf[file.len], DOTM, SIZEOF(DOTM)); /* Copies null terminator */ data/fis-gtm-6.3-007/sr_unix/op_zlink.c:252:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(objnamebuf, file.addr, file.len); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:253:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&objnamebuf[file.len], DOTOBJ, SIZEOF(DOTOBJ)); /* Copies null terminator */ data/fis-gtm-6.3-007/sr_unix/op_zlink.c:286:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(srcnamebuf, v->str.addr, v->str.len); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:287:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&srcnamebuf[v->str.len], DOTM, SIZEOF(DOTM)); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:291:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(objnamebuf, srcnamebuf, v->str.len); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:292:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&objnamebuf[v->str.len], DOTOBJ, SIZEOF(DOTOBJ)); /* Copies null terminator */ data/fis-gtm-6.3-007/sr_unix/op_zlink.c:327:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(objnamebuf, objdir->str.addr, objdir->str.len); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:361:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(srcnamebuf, srcdir->str.addr, srcdir->str.len); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:390:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(objnamebuf, objdir->str.addr, objdir->str.len); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:492:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(objnamebuf, object_file_name, object_name_len); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:509:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(module_name.addr, v->str.addr, module_name.len); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:510:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(routine_name.addr, v->str.addr, routine_name.len); data/fis-gtm-6.3-007/sr_unix/op_zmess.c:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[FAO_BUFFER_SPACE]; data/fis-gtm-6.3-007/sr_unix/op_zrupdate.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pblkbuf[MAX_FN_LEN + 1], statbuf[MAX_FN_LEN + 1], namebuf[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/op_zrupdate.c:193:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(namebuf, objpath.str.addr + plen.p.pblk.b_dir, plen.p.pblk.b_name); data/fis-gtm-6.3-007/sr_unix/op_zrupdate.c:205:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(statbuf, objpath.str.addr, objpath.str.len); data/fis-gtm-6.3-007/sr_unix/op_ztrigger.c:85:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_unix/parse_file.c:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_node_name[MAX_HOST_NAME_LEN + 1], query_node_name[MAX_HOST_NAME_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/parse_file.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char def_string[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/parse_file.c:137:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(query_node_name, trans.addr, query_node_len); data/fis-gtm-6.3-007/sr_unix/parse_file.c:144:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((sockaddr_ptr)&query_sas, ai_ptr->ai_addr, ai_ptr->ai_addrlen); data/fis-gtm-6.3-007/sr_unix/parse_file.c:225:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, def_trans.str.addr, def_trans.str.len); data/fis-gtm-6.3-007/sr_unix/parse_file.c:336:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name, def.l_name, def.b_name); data/fis-gtm-6.3-007/sr_unix/parse_file.c:349:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ext, def.l_ext, def.b_ext); data/fis-gtm-6.3-007/sr_unix/parse_file.c:364:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name + diff, name, pblk->b_name + pblk->b_ext); data/fis-gtm-6.3-007/sr_unix/parse_file.c:365:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(base, def.l_dir, def.b_dir); data/fis-gtm-6.3-007/sr_unix/put_cdidx.c:41:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str->addr, x->addr, x->len); data/fis-gtm-6.3-007/sr_unix/random.c:59:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_RND_IDX+2]; data/fis-gtm-6.3-007/sr_unix/random.c:60:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_seed[MAX_SEED_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/rc.h:82:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char octet[SIZEOF(unsigned char)]; data/fis-gtm-6.3-007/sr_unix/rc.h:87:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char octet[SIZEOF(unsigned short)]; data/fis-gtm-6.3-007/sr_unix/rc.h:92:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char octet[SIZEOF(uint4)]; data/fis-gtm-6.3-007/sr_unix/rc.h:116:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler1[5]; data/fis-gtm-6.3-007/sr_unix/rc.h:117:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char asm1[32]; data/fis-gtm-6.3-007/sr_unix/rc.h:126:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[4]; data/fis-gtm-6.3-007/sr_unix/rc.h:154:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[1]; data/fis-gtm-6.3-007/sr_unix/rc.h:159:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[1]; data/fis-gtm-6.3-007/sr_unix/rc.h:176:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pageaddr[4]; data/fis-gtm-6.3-007/sr_unix/rc.h:187:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pageaddr[4]; data/fis-gtm-6.3-007/sr_unix/rc.h:196:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char page[1]; data/fis-gtm-6.3-007/sr_unix/rc.h:213:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char license_num[12]; data/fis-gtm-6.3-007/sr_unix/rc.h:214:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char license_blk[224]; data/fis-gtm-6.3-007/sr_unix/rc.h:223:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time[4]; data/fis-gtm-6.3-007/sr_unix/rc.h:224:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char license_blk[224]; data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:154:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:352:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:461:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:594:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)head + head->cpt_tab.value, ptr, copy_size); data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:597:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)head + head->cpt_tab.value + copy_size, data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:61:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char repl_instfilename[MAX_FN_LEN + 1]; /* save first instance */ data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:62:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char repl_inst_name[MAX_INSTNAME_LEN]; /* for syslog */ data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char instfilename[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:86:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char machine_name[MAX_MCNAMELEN]; data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scndry_msg[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:147:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)reg->dyn.addr->fname, instfilename, full_len); data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:385:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( (char *)recvpool.recvpool_ctl->recvpool_id.instfilename, instfilename, full_len); data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:386:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(recvpool.recvpool_ctl->recvpool_id.label, GDS_RPL_LABEL, GDS_LABEL_SZ); data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:387:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(recvpool.recvpool_ctl->recvpool_id.now_running, gtm_release_name, gtm_release_name_len + 1); data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:556:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(repl_inst_name, repl_instance.inst_info.this_instname, MAX_INSTNAME_LEN); data/fis-gtm-6.3-007/sr_unix/reg_cmcheck.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuff[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/reg_cmcheck.c:59:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seg->fname, pblk.buffer, pblk.b_esl); data/fis-gtm-6.3-007/sr_unix/relinkctl.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathin[GTM_PATH_MAX], resolvedpath[GTM_PATH_MAX]; /* Includes null terminator char */ data/fis-gtm-6.3-007/sr_unix/relinkctl.c:104:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char relinkctl_path[GTM_PATH_MAX], *ptr; data/fis-gtm-6.3-007/sr_unix/relinkctl.c:116:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pathin, obj_container_name->addr, obj_container_name->len); data/fis-gtm-6.3-007/sr_unix/relinkctl.c:150:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obj_container_name->addr, objdir.addr, objdir.len); data/fis-gtm-6.3-007/sr_unix/relinkctl.c:195:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_link_ptr, &new_link, SIZEOF(open_relinkctl_sgm)); data/fis-gtm-6.3-007/sr_unix/relinkctl.c:197:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, new_link.zro_entry_name.addr, new_link.zro_entry_name.len + 1); data/fis-gtm-6.3-007/sr_unix/relinkctl.c:200:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, new_link.relinkctl_path, len); data/fis-gtm-6.3-007/sr_unix/relinkctl.c:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[256]; data/fis-gtm-6.3-007/sr_unix/relinkctl.c:512:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hdr->zro_entry_name, linkctl->zro_entry_name.addr, hdr->zro_entry_name_len); data/fis-gtm-6.3-007/sr_unix/relinkctl.c:574:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int relinkctl_get_key(char key[GTM_PATH_MAX], mstr *zro_entry_name) data/fis-gtm-6.3-007/sr_unix/relinkctl.c:579:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hexstr[33]; data/fis-gtm-6.3-007/sr_unix/relinkctl.c:597:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key_ptr, (TREF(gtm_linktmpdir)).addr, (TREF(gtm_linktmpdir)).len); data/fis-gtm-6.3-007/sr_unix/relinkctl.c:825:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rec->rtnname_fixed.c[0], rtnname->addr, rtnname->len); data/fis-gtm-6.3-007/sr_unix/relinkctl.h:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zro_entry_name[ZRO_DIR_PATH_MAX + 1]; /* null-terminated full path of the directory in $zroutines data/fis-gtm-6.3-007/sr_unix/relinkctl.h:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char relinkctl_fname[GTM_PATH_MAX]; /* full path of the relinkctl file (mmr hash is in this name) */ data/fis-gtm-6.3-007/sr_unix/relinkctl.h:293:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int relinkctl_get_key(char key[GTM_PATH_MAX], mstr *zro_entry_name); data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rename_fn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inst_fn[MAX_FN_LEN + 1], inst_name[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char machine_name[MAX_MCNAMELEN], buff_unaligned[REPL_INST_HDR_SIZE + GTMSRC_LCL_SIZE + 8]; data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:175:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&repl_instance->label[0], GDS_REPL_INST_LABEL, GDS_REPL_INST_LABEL_SZ-1); data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:189:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(repl_instance->inst_info.created_nodename, machine_name, MAX_NODENAME_LEN); data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:196:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(repl_instance->inst_info.this_instname, inst_name, inst_name_len); data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:88:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[LENGTH_OF_TIME + 1]; \ data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dststr[MAX_DIGITS_IN_INT], dstlen; data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:382:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[LENGTH_OF_TIME + 1]; data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:503:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nodename_buff[MAX_NODENAME_LEN + 1], *created_nodename; data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:530:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(created_nodename, cur_histinfo->lms_group.created_nodename, MAX_NODENAME_LEN); data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:735:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secondary_addr[SA_MAXLEN + 1]; data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:785:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ? (char *)state_array[gtmsourcelocal_ptr->gtmsource_state] : "UNKNOWN"; data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c:82:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_str[MAX_REPL_OPMSG_LEN], temp_str1[MAX_REPL_OPMSG_LEN]; data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c:140:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inst_fn[MAX_FN_LEN + 1], buff_unaligned[REPL_INST_HDR_SIZE + GTMSRC_LCL_SIZE + 8]; data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c:141:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char instname[MAX_INSTNAME_LEN]; data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c:281:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(repl_instance->inst_info.this_instname, instname, instname_len + 1); data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c:298:79: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert((NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open); data/fis-gtm-6.3-007/sr_unix/repl_instance.c:111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_inst_fn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/repl_instance.c:154:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(repl_instfilename, fn, *fn_len + 1); /* include null from get_full_path */ data/fis-gtm-6.3-007/sr_unix/repl_instance.c:647:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char histdetail[MAX_REPL_OPMSG_LEN]; data/fis-gtm-6.3-007/sr_unix/repl_instance.c:915:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char histdetail[MAX_REPL_OPMSG_LEN]; data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1010:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(inst_hdr->last_histinfo_num, nexthistinfo.last_histinfo_num, data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1131:34: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (jnlpool->jnlpool_dummy_reg->open) data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1163:37: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(jnlpool->jnlpool_dummy_reg->open); /* journal pool exists and this process has done "jnlpool_init" */ data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1260:79: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(((NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open) data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1326:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1381:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(reg->open); data/fis-gtm-6.3-007/sr_unix/repl_instance.h:50:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char label[GDS_REPL_INST_LABEL_SZ]; /* format of instance file. initialized to GDS_REPL_INST_LABEL */ data/fis-gtm-6.3-007/sr_unix/repl_instance.h:54:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char filler_16[1]; data/fis-gtm-6.3-007/sr_unix/repl_instance.h:130:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char filler_1024[44]; data/fis-gtm-6.3-007/sr_unix/repl_instance.h:138:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char secondary_instname[MAX_INSTNAME_LEN]; /* Secondary instance corresponding to this structure */ data/fis-gtm-6.3-007/sr_unix/repl_instance.h:145:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char filler_64[32]; /* For future expansion */ data/fis-gtm-6.3-007/sr_unix/repl_instance.h:150:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(srclcl)->secondary_instname[0], &(sourcelocal)->secondary_instname[0], MAX_INSTNAME_LEN - 1); \ data/fis-gtm-6.3-007/sr_unix/repl_instance.h:157:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(sourcelocal)->secondary_instname[0], &(srclcl)->secondary_instname[0], MAX_INSTNAME_LEN - 1); \ data/fis-gtm-6.3-007/sr_unix/repl_log.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */ data/fis-gtm-6.3-007/sr_unix/repl_log.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmt_str[BUFSIZ]; data/fis-gtm-6.3-007/sr_unix/repl_log_init.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char log_file_name[MAX_FN_LEN + 1], *err_code; data/fis-gtm-6.3-007/sr_unix/repl_logfileinfo_get.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullpath[GTM_PATH_MAX], *cwdptr; data/fis-gtm-6.3-007/sr_unix/repl_logfileinfo_get.c:70:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msgp->fullpath, fullpath, fullpath_len); data/fis-gtm-6.3-007/sr_unix/repl_msg.h:126:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msg[MIN_REPL_MSGLEN - REPL_MSG_HDRLEN]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:155:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msg[MIN_REPL_MSGLEN - REPL_MSG_HDRLEN2]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:175:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char start_seqno[SIZEOF(seq_num)]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:182:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[8]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:189:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char start_seqno[SIZEOF(seq_num)]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:191:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char start_flags[4]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:196:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[8]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[13]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:215:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char instname[MAX_INSTNAME_LEN]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:220:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[5]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:227:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char instname[MAX_INSTNAME_LEN]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:234:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[4]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:241:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char instname[MAX_INSTNAME_LEN]; /* The name of this replication instance */ data/fis-gtm-6.3-007/sr_unix/repl_msg.h:243:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[7]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:250:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char instname[MAX_INSTNAME_LEN]; /* The name of this replication instance */ data/fis-gtm-6.3-007/sr_unix/repl_msg.h:263:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[7]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_16[3]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:273:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[REPL_MSG_CMPDATALEN]; /* compressed (if REPL_CMP_TEST) or uncompressed (if REPL_CMP_SOLVE) data */ data/fis-gtm-6.3-007/sr_unix/repl_msg.h:274:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char overflowdata[(MAX_CMP_EXPAND_FACTOR - 1) * REPL_MSG_CMPDATALEN]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:287:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[8]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:295:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char instname[MAX_INSTNAME_LEN]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:305:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[8]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:328:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char instname[MAX_INSTNAME_LEN]; /* The instance name that generated this triple */ data/fis-gtm-6.3-007/sr_unix/repl_msg.h:329:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rcvd_from_instname[MAX_INSTNAME_LEN]; /* instance name this triple was received from (on the secondary) */ data/fis-gtm-6.3-007/sr_unix/repl_msg.h:359:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[16]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:373:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ack_seqno[SIZEOF(seq_num)]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:374:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ack_time[SIZEOF(gtm_time4_t)]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:375:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char filler_32[12]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:393:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[16]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:402:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[16]; data/fis-gtm-6.3-007/sr_unix/repl_msg.h:412:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler_32[15]; /* to ensure that at least 32 bytes are sent across (gtmrecv_fetchresync relies on this) */ data/fis-gtm-6.3-007/sr_unix/repl_msg.h:413:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullpath[REPL_LOGFILE_PATH_MAX + 1]; /* + 1 for null-terminator */ data/fis-gtm-6.3-007/sr_unix/repl_sp.h:22:33: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define F_COPY_GDID(to, from) memcpy(&(to), &(from), SIZEOF(to)) data/fis-gtm-6.3-007/sr_unix/rtnhdr.h:90:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jsb[RHEAD_JSB_SIZE]; /* GTM_CODE object marker */ data/fis-gtm-6.3-007/sr_unix/rtnhdr.h:139:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char checksum_128[16]; /* 16-byte MurmurHash3 checksum of routine source code */ data/fis-gtm-6.3-007/sr_unix/rtnhdr.h:274:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char name[1]; data/fis-gtm-6.3-007/sr_unix/rtnobj.c:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[256]; \ data/fis-gtm-6.3-007/sr_unix/rtnobj.c:340:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[256]; data/fis-gtm-6.3-007/sr_unix/same_device_check.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer1[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_unix/same_device_check.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer2[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_unix/same_device_check.c:55:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pport_buffer1[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_unix/same_device_check.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pport_buffer2[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_unix/same_device_check.c:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host_buffer1[NI_MAXHOST]; data/fis-gtm-6.3-007/sr_unix/same_device_check.c:58:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host_buffer2[NI_MAXHOST]; data/fis-gtm-6.3-007/sr_unix/same_device_check.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char phost_buffer1[NI_MAXHOST]; data/fis-gtm-6.3-007/sr_unix/same_device_check.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char phost_buffer2[NI_MAXHOST]; data/fis-gtm-6.3-007/sr_unix/secshr_client.c:72:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/secshr_client.c:81:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char gtmsecshr_path[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/secshr_client.c:189:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_perm[MAX_PERM_LEN]; data/fis-gtm-6.3-007/sr_unix/secshr_client.c:208:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtmsecshr_path, gtm_dist, len); data/fis-gtm-6.3-007/sr_unix/secshr_client.c:210:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gtmsecshr_path + len + 1, GTMSECSHR_EXECUTABLE, STRLEN(GTMSECSHR_EXECUTABLE)); data/fis-gtm-6.3-007/sr_unix/secshr_client.c:244:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesg.mesg.path, path, path_len); data/fis-gtm-6.3-007/sr_unix/secshr_client.c:250:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mesg.mesg.db_ipcs, &db_ipcs, (offsetof(ipcs_mesg, fn[0]) + db_ipcs.fn_len + 1)); data/fis-gtm-6.3-007/sr_unix/semstat2.c:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[OUT_LINE]; data/fis-gtm-6.3-007/sr_unix/send_msg.c:84:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg_buffer[1024]; data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:42:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char zstatus_buff[2*OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:70:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zstatus_buff, val.str.addr, val.str.len); data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:75:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zstatus_bptr, src->addr, src->len); data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:87:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zstatus_buff[OUT_BUFF_SIZE], TREF(util_outbuff_ptr), util_len); /* save original message */ data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:91:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zstatus_bptr, TREF(util_outbuff_ptr), TREF(util_outptr) - TREF(util_outbuff_ptr)); data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:94:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zstatus_bptr, &zstatus_buff[OUT_BUFF_SIZE], util_len); data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:97:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TREF(util_outbuff_ptr), &zstatus_buff[OUT_BUFF_SIZE], util_len); data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:102:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zstatus_bptr, TREF(util_outbuff_ptr), util_len); data/fis-gtm-6.3-007/sr_unix/sgtm_putmsg.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg_buffer[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/sgtm_putmsg.c:100:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out_str, TREF(util_outbuff_ptr), out_str_len); data/fis-gtm-6.3-007/sr_unix/source_file.c:94:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *p, source_file_string[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/source_file.c:113:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(source_file_string, faddr, flen); data/fis-gtm-6.3-007/sr_unix/source_file.c:136:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(source_file_name, ret.str.addr, source_name_len); data/fis-gtm-6.3-007/sr_unix/source_file.c:151:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(routine_name.addr, p, routine_name.len); data/fis-gtm-6.3-007/sr_unix/source_file.c:152:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(module_name.addr, routine_name.addr, routine_name.len); data/fis-gtm-6.3-007/sr_unix/source_file.c:163:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(int_module_name.addr, routine_name.addr, routine_name.len); data/fis-gtm-6.3-007/sr_unix/source_file.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, buff[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/source_file.c:230:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(module_name.addr, p, n); data/fis-gtm-6.3-007/sr_unix/source_file.c:231:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(routine_name.addr, p, n); data/fis-gtm-6.3-007/sr_unix/source_file.c:238:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(int_module_name.addr, routine_name.addr, n); data/fis-gtm-6.3-007/sr_unix/source_file.c:253:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rev_time_buf, p + 4, REV_TIME_BUFF_LEN); data/fis-gtm-6.3-007/sr_unix/source_file.c:281:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((TREF(source_buffer)).addr, val.str.addr, val.str.len); data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tempfilename, eof_marker[EOF_MARKER_SIZE], tempdir_trans_buffer[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempdir_full_buffer[GTM_PATH_MAX], tempnamprefix[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:203:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */ data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:284:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tempnamprefix, SNAPSHOT_TMP_PREFIX, STR_LIT_LEN(SNAPSHOT_TMP_PREFIX)); data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:286:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tempnamprefix + tempnamprefix_len, reg->rname, reg->rname_len); data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:618:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_ss_ptr->header, csd, SGMNT_HDR_LEN); data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:619:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(util_ss_ptr->master_map, MM_ADDR(csd), MASTER_MAP_SIZE(csd)); data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:636:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ss_shm_ptr->shadow_file_header, csd, SGMNT_HDR_LEN); data/fis-gtm-6.3-007/sr_unix/ss_release.c:124:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shadow_file[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/trans_log_name.c:29:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATICDEF char trans_log_name_startbuff[MAX_TRANS_NAME_LEN]; data/fis-gtm-6.3-007/sr_unix/trans_log_name.c:61:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b_ptr, s_start, s_len); data/fis-gtm-6.3-007/sr_unix/trans_log_name.c:79:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trans_log_name_buff, s_start + 1, s_len); data/fis-gtm-6.3-007/sr_unix/trans_log_name.c:96:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b_ptr, s_start, s_len); data/fis-gtm-6.3-007/sr_unix/trans_log_name.c:111:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b_ptr, s_start, s_len); data/fis-gtm-6.3-007/sr_unix/trigger.h:104:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char out_str[MAX_ZWR_EXP_RATIO * OUT_BUFF_SIZE]; \ data/fis-gtm-6.3-007/sr_unix/trigger.h:118:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(DST, SRC, LEN); \ data/fis-gtm-6.3-007/sr_unix/trigger.h:155:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, HASHT_GBLNAME, HASHT_GBLNAME_LEN); \ data/fis-gtm-6.3-007/sr_unix/trigger.h:561:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(DISP_TRIGVN, TRIGVN, TRIGVN_LEN); \ data/fis-gtm-6.3-007/sr_unix/trigger.h:565:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&DISP_TRIGVN[DISP_TRIGVN_LEN], REG->rname, REG->rname_len); \ data/fis-gtm-6.3-007/sr_unix/trigger_compare.c:49:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_unix/trigger_compare.c:69:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(PTR, values[SUB], len); \ data/fis-gtm-6.3-007/sr_unix/trigger_compare.c:104:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, trigvn, trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_compare.c:125:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, trigvn, trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_compare.c:225:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char util_buff[MAX_TRIG_UTIL_LEN]; /* needed for HASHT_GVN_DEFINITION_RETRY_OR_ERROR macro */ data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:71:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trunc_name[MAX_TRIGNAME_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:150:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trunc_name, trigvn, used_trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:189:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_and_index[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:222:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name_and_index, trig_gbl.str.addr, ++len); /* inline increment intended */ data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:245:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_str[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:280:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_str, key_val.str.addr, len); data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:316:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_str, key_val.str.addr, len); data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:330:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curr_name[MAX_MIDENT_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:335:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char save_name[MAX_MIDENT_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:343:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trigvn[MAX_MIDENT_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:348:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char utilprefix[1024]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:354:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char disp_trigvn[MAX_MIDENT_LEN + SPANREG_REGION_LITLEN + MAX_RN_LEN + 1 + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:388:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_name, trigger_name, trigger_name_len); data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:408:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curr_name, save_name, trigger_name_len); data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:430:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trigvn, trig_gbl.str.addr, trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:501:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curr_name, mv_curr_nam.str.addr, mv_curr_nam.str.len); data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:563:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_trig_str[MAX_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:565:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trig_name[MAX_TRIGNAME_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:568:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tt_val[NUM_SUBS]; data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:585:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr1, trigvn, trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:615:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trig_name, trigger_value.str.addr, trig_name_len); data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:627:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr1, trigger_value.str.addr, trig_len); data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:679:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr1, trigvn, trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:741:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr1, trigger_value.str.addr, trig_len); data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c:58:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c:85:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char util_buff[MAX_TRIG_UTIL_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c:106:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xecute_buff, first_rec->str.addr, xecute_buff_len); data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c:117:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xecute_buff, key_val.str.addr, xecute_buff_len); data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c:198:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xecute_buff_ptr, key_val.str.addr, key_val.str.len); data/fis-gtm-6.3-007/sr_unix/trigger_incr_cycle.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *cycle_ptr, cycle_str[MAX_DIGITS_IN_INT + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_locate_andor_load.c:179:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_unix/trigger_locate_andor_load.c:250:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:79:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char out_str[64]; /* Plenty of room for $ZCH(xxx) */ \ data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:89:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char out_str1[64]; /* Plenty of room for $ZCH(xxx) */ \ data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:90:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char out_str2[MAX_ZWR_EXP_RATIO * OUT_BUFF_SIZE]; \ data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:102:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char out_str[MAX_ZWR_EXP_RATIO * OUT_BUFF_SIZE]; \ data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:172:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(DST_PTR, PTR, add_len); \ data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:194:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(DST_PTR, PTR, add_len); \ data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:294:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst_string[MAX_DCHAR_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:433:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst_string[MAX_DELIM_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:438:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src_string[MAX_DELIM_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:523:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(delim_str, dst_string, dst.len); data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:560:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_options[MAX_OPTIONS_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:568:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(local_options, option_str, option_len); data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:620:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst[MAX_GVSUBS_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:632:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *lvn_str[MAX_LVN_COUNT]; data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:1186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst_string[MAX_SRCLINE]; data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:1215:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xecute_str, dst_string, ++dst_len); data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:1263:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr1, input, input_len); data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:1319:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trigvn, ptr, trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_select.c:76:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_unix/trigger_select.c:103:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(OUT_PTR, (const void *)VAL, VAL_LEN); \ data/fis-gtm-6.3-007/sr_unix/trigger_select.c:124:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tmp_buff[MAX_ZWR_EXP_RATIO * MAX_BUFF_SIZE]; \ data/fis-gtm-6.3-007/sr_unix/trigger_select.c:183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst[MAX_GVSUBS_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_select.c:218:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out_rec[MAX_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/trigger_select.c:232:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cycle[MAX_DIGITS_IN_INT + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_select.c:273:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cycle, trigger_value.str.addr, cycle_len); data/fis-gtm-6.3-007/sr_unix/trigger_select.c:426:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char save_name[MAX_MIDENT_LEN], curr_name[MAX_MIDENT_LEN], curr_gbl[MAX_MIDENT_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_select.c:441:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_name, gbl_name, gbl_name_len); data/fis-gtm-6.3-007/sr_unix/trigger_select.c:448:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curr_name, gbl_name, gbl_name_len); data/fis-gtm-6.3-007/sr_unix/trigger_select.c:463:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curr_name, mv_curr_nam.str.addr, mv_curr_nam.str.len); data/fis-gtm-6.3-007/sr_unix/trigger_select.c:496:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curr_gbl, mv_trigger_val.str.addr, trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_select.c:517:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curr_name, mv_curr_nam.str.addr, mv_curr_nam.str.len); data/fis-gtm-6.3-007/sr_unix/trigger_select.c:532:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char global[MAX_MIDENT_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_select.c:562:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(global, curr_gbl_name.str.addr, gbl_len); data/fis-gtm-6.3-007/sr_unix/trigger_select.c:725:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char save_select_list[MAX_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/trigger_select.c:744:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_select_list, select_list, select_list_len); data/fis-gtm-6.3-007/sr_unix/trigger_source_read_andor_verify.c:79:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_unix/trigger_source_read_andor_verify.c:352:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_unix/trigger_source_read_andor_verify.c:421:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_unix/trigger_trgfile.c:79:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_unix/trigger_trgfile.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *values[NUM_SUBS]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:90:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF unsigned char t_fail_hist[CDB_MAX_TRIES]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lcl_cmds[MAX_COMMANDS_LEN + 1]; \ data/fis-gtm-6.3-007/sr_unix/trigger_update.c:151:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lcl_cmds, COMMANDS, STRLEN(COMMANDS) + 1); \ data/fis-gtm-6.3-007/sr_unix/trigger_update.c:221:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lcl_options[MAX_OPTIONS_LEN + 1]; \ data/fis-gtm-6.3-007/sr_unix/trigger_update.c:225:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lcl_options, OPTIONS, STRLEN(OPTIONS) + 1); \ data/fis-gtm-6.3-007/sr_unix/trigger_update.c:590:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char indx_str[MAX_DIGITS_IN_INT]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:594:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_and_index[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:610:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name_and_index, trigvn, trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:613:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, indx_str, num_len); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:673:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char util_buff[MAX_TRIG_UTIL_LEN]; /* needed for HASHT_GVN_DEFINITION_RETRY_OR_ERROR macro */ data/fis-gtm-6.3-007/sr_unix/trigger_update.c:770:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd_str[MAX_COMMANDS_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:864:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char option_str[MAX_OPTIONS_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:895:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd_str[MAX_COMMANDS_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:928:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char db_cmds[MAX_COMMANDS_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:933:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trig_cmds[MAX_COMMANDS_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:934:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trig_name[MAX_USER_TRIGNAME_LEN + 2]; /* One spot for # delimiter and one for trailing 0 */ data/fis-gtm-6.3-007/sr_unix/trigger_update.c:935:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trig_options[MAX_OPTIONS_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:936:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char util_buff[MAX_TRIG_UTIL_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:952:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trig_cmds, val.str.addr, trig_cmds_len); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:969:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trig_options, val.str.addr, trig_options_len); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:979:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trig_name, val.str.addr, trig_name_len); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1030:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(db_cmds, trig_cmds, SIZEOF(trig_cmds)); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1060:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_and_index[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1065:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trig_name[MAX_USER_TRIGNAME_LEN + 2]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1067:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unique_seq_str[NUM_TRIGNAME_SEQ_CHARS + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1079:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trig_name, trigvn, trigname_len); /* immediate prior statement ensures trigname_len is OK */ data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1113:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seq_ptr, trig_name, trigname_len); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1116:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seq_ptr, uniq_ptr, uniq_ptr_len); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1123:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr1, trigvn, trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1127:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr1, trigger_count->str.addr, trigger_count->str.len); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1141:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ans[2]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1149:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tfile_rec_val[MAX_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trigvn[MAX_MIDENT_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1151:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char disp_trigvn[MAX_MIDENT_LEN + SPANREG_REGION_LITLEN + MAX_RN_LEN + 1 + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *values[NUM_SUBS], *save_values[NUM_SUBS]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1160:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_str[MAX_HASH_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xecute_buffer[MAX_BUFF_SIZE + MAX_XECUTE_LEN]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1170:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char utilprefix[1024]; data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1301:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trigjrecptr, trigjrec->str.addr, trigjreclen - 1); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1448:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_value_len, value_len, SIZEOF(value_len)); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1450:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_values, values, SIZEOF(values)); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1453:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(disp_trigvn, trigvn, trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1504:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(value_len, save_value_len, SIZEOF(save_value_len)); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1506:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(values, save_values, SIZEOF(save_values)); data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1554:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trig_name[MAX_USER_TRIGNAME_LEN + 2]; /* One spot for '#' delimiter and one for trailing '\0' */ data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1918:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trig_name, values[TRIGNAME_SUB], value_len[TRIGNAME_SUB] + 1); data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_and_index[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT]; data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char indx_str[MAX_DIGITS_IN_INT]; data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:156:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name_and_index, trigvn, trigvn_len); data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:159:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, indx_str, num_len); data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_and_index[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT]; data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trigvn[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT], nullbyte[1]; data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:194:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:347:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&trigvn[0], gvname->str.addr, gvname->str.len); data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:490:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trigname, tmpmval.str.addr, tmpmval.str.len); data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:524:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trigname, tmpmval.str.addr, trigname_len); data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char log_file[MAX_FN_LEN + 1], file_suffix_str[MAX_FN_LEN + 1], pid_str[11], *pid_end_ptr, *file_suffix; data/fis-gtm-6.3-007/sr_unix/util_exit_handler.c:63:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reg->open && !reg->was_open) data/fis-gtm-6.3-007/sr_unix/util_help.c:21:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLREF char gtm_dist[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix/util_help.c:35:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *utilImageGLDs[UTIL_HELP_IMAGES] = data/fis-gtm-6.3-007/sr_unix/util_help.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mumps_cmd_string[MUMPS_CMD_STRING_SIZE]; data/fis-gtm-6.3-007/sr_unix/util_help.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char help_cmd_string[HELP_CMD_STRING_SIZE]; data/fis-gtm-6.3-007/sr_unix/util_out_print_gtmio.c:84:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newdst, dst, dstlen); data/fis-gtm-6.3-007/sr_unix/util_out_print_gtmio.c:91:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst + dstlen, src, srclen - 1); data/fis-gtm-6.3-007/sr_unix/util_output.c:55:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char facility[MAX_INSTNAME_LEN + 100]; data/fis-gtm-6.3-007/sr_unix/util_output.c:104:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(offset, strptr, STRLEN(strptr)); \ data/fis-gtm-6.3-007/sr_unix/util_output.c:194:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char numa[22]; data/fis-gtm-6.3-007/sr_unix/util_output.c:227:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, prefix, prefix_len); data/fis-gtm-6.3-007/sr_unix/util_output.c:313:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, message, chlen); data/fis-gtm-6.3-007/sr_unix/util_output.c:429:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, c, chlen); data/fis-gtm-6.3-007/sr_unix/util_output.c:609:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, numa + SIZEOF(INTPTR_T), length/2); data/fis-gtm-6.3-007/sr_unix/util_output.c:617:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, numa, length); data/fis-gtm-6.3-007/sr_unix/util_output.c:645:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_inst_fn[MAX_FN_LEN + 1], fn[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/util_output.c:757:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmt_buff[OUT_BUFF_SIZE]; /* needs to be same size as that of the util out buffer */ data/fis-gtm-6.3-007/sr_unix/util_output.c:863:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TREF(util_outbuff_ptr), fmt_buff, fmtc - fmt_buff); data/fis-gtm-6.3-007/sr_unix/util_output.c:920:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, TREF(util_outbuff_ptr), srclen); data/fis-gtm-6.3-007/sr_unix/util_output_cm.c:34:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char outbuff[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/util_output_cm.c:55:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outptr, TREF(util_outbuff_ptr), msglen); data/fis-gtm-6.3-007/sr_unix/wait_for_disk_space.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wait_comment[MAX_FREEZE_COMMENT_LEN]; data/fis-gtm-6.3-007/sr_unix/wcs_clean_dbsync.c:87:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!reg->open) data/fis-gtm-6.3-007/sr_unix/wcs_clean_dbsync.c:98:65: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). check_csaddrs = ((NULL == save_region || FALSE == save_region->open) ? NULL : (&FILE_INFO(save_region)->s_addrs)); data/fis-gtm-6.3-007/sr_unix/wcs_wtstart.c:619:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_bp, bp, SIZEOF(blk_hdr)); data/fis-gtm-6.3-007/sr_unix/wcs_wtstart.c:637:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save_bp, bp, bp->bsiz); data/fis-gtm-6.3-007/sr_unix/zhist.c:120:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)zhent, (char *)&zhist_valent->zro_valent, SIZEOF(zro_validation_entry)); data/fis-gtm-6.3-007/sr_unix/zhist.c:163:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zhist_valent->rtnname.c, rtnname->addr, rtnname->len); data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:28:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmd_qlf.object_file.str.addr, NAME, LEN); \ data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cbuf[MAX_LINE], inputf[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:68:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cbuf + SIZEOF(COMMAND) - 1, quals->addr, quals->len); data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:117:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pblk.l_name[pblk.b_name], DOTM, SIZEOF(DOTM)); data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:122:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(source_file_name, pblk.buffer, source_name_len); data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:124:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(srcstr, source_file_name, source_name_len); data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:129:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(routine_name.addr, file.addr, file.len); data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:132:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(object_file_name, pblk.l_name, object_name_len); data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:160:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(routine_name.addr, &object_file_name[ci], clen); data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:173:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(object_file_name, routine_name.addr, clen); data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:180:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(module_name.addr, routine_name.addr, clen); data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:191:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(int_module_name.addr, routine_name.addr, clen); data/fis-gtm-6.3-007/sr_unix/zlmov_lnames.c:60:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lab_ptr, lab_ent->lab_name.addr, lab_ent->lab_name.len); data/fis-gtm-6.3-007/sr_unix/zro_load.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tranbuf[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/zro_load.c:273:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uchar_ptr_t)TREF(zro_root), (uchar_ptr_t)array, total_ents * SIZEOF(zro_ent)); data/fis-gtm-6.3-007/sr_unix/zro_load.c:290:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(op->str.addr, pblk.buffer, pblk.b_esl); data/fis-gtm-6.3-007/sr_unix/zro_load.c:310:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(op->str.addr, pblk.buffer, pblk.b_esl); data/fis-gtm-6.3-007/sr_unix/zro_search.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char objfn[PATH_MAX], srcfn[PATH_MAX], *obp, *sbp, save_char; data/fis-gtm-6.3-007/sr_unix/zro_search.c:96:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(objfn, objstr->addr, rtnname.len); data/fis-gtm-6.3-007/sr_unix/zro_search.c:120:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obp, op->str.addr, op->str.len); data/fis-gtm-6.3-007/sr_unix/zro_search.c:124:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obp, objstr->addr, objstr->len); data/fis-gtm-6.3-007/sr_unix/zro_search.c:154:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (sbp, sp->str.addr, sp->str.len); data/fis-gtm-6.3-007/sr_unix/zro_search.c:158:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp, srcstr->addr, srcstr->len); data/fis-gtm-6.3-007/sr_unix/zro_search.c:215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obj_file[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/zro_shlibs.h:20:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shlib_name[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:43:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (V)->str.addr = (char *)dev_param_names[dev_param_index[zshow_param_index[(TEXT)].letter] + \ data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:47:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (V)->str.addr = (char *)dev_param_names[dev_param_index[zshow_param_index[(TEXT)].letter] + \ data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:76:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char delim_buff_sm[MAX_DELIM_LEN]; data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char delim_mstr_buff[(MAX_DELIM_LEN * MAX_ZWR_EXP_RATIO) + 11]; data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csname[_CSNAME_LEN_MAX + 1], *csptr; data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:801:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(delim_buff_sm, data/fis-gtm-6.3-007/sr_unix/zshow_rctldump.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/zshow_zcalls.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:95:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(TREF(dollar_ztimeout)).ztimeout_vector, &literal_null, SIZEOF(mval)); \ data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:122:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(local_str_val, inp_val->str.addr, inp_val->str.len); data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:140:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vector_ptr, tok_ptr, max_read_len); data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:156:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ztimeout_seconds, &literal_minusone, SIZEOF(mval)); data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:201:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vector_ptr, tok_ptr, max_read_len); data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:363:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mv_st_ent->mv_st_cont.mvs_zintr.savextref.addr, extnam_str.addr, extnam_str.len); data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:370:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mv_st_ent->mv_st_cont.mvs_zintr.dollar_ecode_save, &dollar_ecode, SIZEOF(dollar_ecode)); data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:371:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mv_st_ent->mv_st_cont.mvs_zintr.dollar_stack_save, &dollar_stack, SIZEOF(dollar_stack)); data/fis-gtm-6.3-007/sr_unix_cm/gtcm.h:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char req[OMI_HIST_BUFSIZ]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm.h:82:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rsp[OMI_HIST_BUFSIZ]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm.h:93:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char req[RC_HIST_BUFSIZ]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm.h:94:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rsp[RC_HIST_BUFSIZ]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_bgn_net.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_buffer[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_bgn_net.c:114:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port = atoi(omi_service); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_bgn_net.c:124:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port = atoi(port_buffer); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_cn_acpt.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pklog[MAX_LOG_LEN], *tmp_time; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_cn_acpt.c:88:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cptr->stats.sas, &sas, sln); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:64:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(omi_hist[omi_hist_num].req, buff, len); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:68:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(omi_hist[omi_hist_num].req, buff, OMI_HIST_BUFSIZ); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:76:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(omi_hist[omi_hist_num].rsp, buff, len); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:80:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(omi_hist[omi_hist_num].rsp, buff, OMI_HIST_BUFSIZ); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:98:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rc_hist[rc_hist_num].req, buff, len); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:102:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rc_hist[rc_hist_num].req, buff, RC_HIST_BUFSIZ); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:110:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rc_hist[rc_hist_num].rsp, buff, len); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:114:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rc_hist[rc_hist_num].rsp, buff, RC_HIST_BUFSIZ); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:120:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAX_HIST_REC_LEN]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAX_HIST_REC_LEN + 1]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_init.c:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[256]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_main.c:52:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char image_id[MAX_IMAGE_NAME_LEN]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_ping.c:93:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char pingrcv[IP_MAXPACKET], pingsend[256]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_ping.c:168:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[SA_MAXLEN]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_ping.c:218:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[SA_MAXLEN]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[OMI_BUFSIZ], *bptr, *xptr, *end, *chr; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c:68:29: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). } else if (INV_FD_P((fd = open(argv[argc - 1], O_RDONLY)))) data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c:78:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). else if (INV_FD_P((fd = open(argv[argc - 1], O_RDONLY)))) data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c:169:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(chr, xptr, len); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:47:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[NI_MAXHOST + NI_MAXSERV + 4]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipname[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[NI_MAXHOST]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:72:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newmsg[512]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[16]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:111:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subdir[GTM_PATH_MAX]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:163:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(chr, ptr, len); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_play.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[OMI_BUFSIZ]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_play.c:85:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (INV_FD_P((conn.fd = open(argv[argc - 1], O_RDONLY)))) data/fis-gtm-6.3-007/sr_unix_cm/gtcm_prsopt.c:131:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). case opt_rc_id: rc_server_id = atoi(*(argv + 1)); break; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_prsopt.c:143:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). t = atoi(*(argv + 1)); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_prsopt.c:151:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). t = atoi(*(argv + 1)); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_rep_err.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outbuf[OUT_BUFF_SIZE]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_shmclean.c:55:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[512]; data/fis-gtm-6.3-007/sr_unix_cm/gtcm_shmclean.c:153:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[512]; data/fis-gtm-6.3-007/sr_unix_cm/omi.h:148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char octet[OMI_SI_SIZ]; data/fis-gtm-6.3-007/sr_unix_cm/omi.h:154:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char octet[OMI_LI_SIZ]; data/fis-gtm-6.3-007/sr_unix_cm/omi.h:160:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char octet[OMI_VI_SIZ]; data/fis-gtm-6.3-007/sr_unix_cm/omi.h:339:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ag_name[MAX_USER_NAME]; data/fis-gtm-6.3-007/sr_unix_cm/omi_dmp_pkt.c:89:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(chr, ptr, len); data/fis-gtm-6.3-007/sr_unix_cm/omi_gvextnam.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptr, *end, c[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix_cm/omi_gvextnam.c:90:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cur_seg->fname, pblk.l_dir, pblk.b_dir); data/fis-gtm-6.3-007/sr_unix_cm/omi_lkextnam.c:104:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&r->value[0], lck.str.addr - 1, elen); data/fis-gtm-6.3-007/sr_unix_cm/omi_lkextnam.c:106:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(MLK_PVTBLK_TAIL(r) + 1, data, si.value); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c:157:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ag_name, cptr->xptr, ss_len.value); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c:172:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ag_pass, cptr->xptr, ss_len.value); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c:241:12: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void) memcpy(bptr, GTM_RELEASE_NAME, len); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_def.c:88:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bptr, vo.str.addr, vo.str.len); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_def.c:105:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bptr, vg.str.addr, vg.str.len); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_get.c:83:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bptr, vo.str.addr, vo.str.len); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_get.c:96:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bptr, vg.str.addr, vg.str.len); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_next.c:68:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bptr, v.str.addr, v.str.len); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_ordr.c:86:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bptr, vo.str.addr, vo.str.len); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_ordr.c:113:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey, gv_altkey, gv_altkey->end + SIZEOF(gv_key)); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_ordr.c:136:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bptr, vg.str.addr, vg.str.len); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_qry.c:89:12: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void) memcpy(bptr, eptr, len.value); data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_rord.c:68:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bptr, v.str.addr, v.str.len); data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c:88:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[OMI_BUFSIZ], *bptr, *xend, *bend; data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[OMI_MSG_SIZE]; data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024], *cp, *cp1, msg[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c:98:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dsid_list->fname, fpath2.addr, fpath2.len); data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c:104:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_cur_region->dyn.addr->fname, fpath2.addr, fpath2.len); data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c:198:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fdi_ptr->fname, cp, len); data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c:204:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_cur_region->dyn.addr->fname, cp, len); data/fis-gtm-6.3-007/sr_unix_cm/rc_frmt_lck.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_ZWR_KEY_SZ], *b_top, *b, *c_top, *sub_start; data/fis-gtm-6.3-007/sr_unix_cm/rc_gbl_ord.c:97:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rsp->page, bh->buffaddr, SIZEOF(blk_hdr)); data/fis-gtm-6.3-007/sr_unix_cm/rc_gbl_ord.c:99:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rsp->page + SIZEOF(blk_hdr) + RC_BLKHD_PAD, data/fis-gtm-6.3-007/sr_unix_cm/rc_gbl_ord.c:108:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rc_overflow->buff, data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c:31:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char pos_code[100] = data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c:45:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static readonly unsigned char neg_code[100] = data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c:61:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[MAX_KEY_SZ + 1]; data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c:66:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[MAX_ZWR_KEY_SZ], *end; data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c:72:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char temp_mantissa[NUM_DEC_DG_2L / 2 + 3]; /* Need 1 byte for each two digits. Add 3 bytes slop */ data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getp.c:96:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rsp->page, rc_overflow->buff + (offset - rc_overflow->offset), size_return); data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getp.c:150:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rsp->page, buffaddr, SIZEOF(blk_hdr)); data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getp.c:153:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rsp->page + SIZEOF(blk_hdr) + RC_BLKHD_PAD, data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getp.c:164:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rc_overflow->buff, data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getr.c:107:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, req->key.key, req->key.len.value); data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getr.c:231:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rsp->page, bh->buffaddr, SIZEOF(blk_hdr)); data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getr.c:233:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rsp->page + SIZEOF(blk_hdr) + RC_BLKHD_PAD, bh->buffaddr + SIZEOF(blk_hdr), data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getr.c:241:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rc_overflow->buff, bh->buffaddr + size_return - RC_BLKHD_PAD, rc_overflow->size); data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_kill.c:79:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, req->key.key, req->key.len.value); data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_lock.c:58:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_buff[KEY_BUFF_SIZE], *lkname; data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_lock.c:59:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[12], *cp; data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_lock.c:199:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mp->value, key_buff, mp->nref_length); data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_lock.c:203:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(MLK_PVTBLK_TAIL(mp) + 1, buff, pid_len); data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_set.c:79:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, req->key.key, req->key.len.value); data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_setf.c:72:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gv_currkey->base, req->key.key, req->key.len.value); data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_setf.c:105:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v.str.addr + data_off, ptr, v.str.len - data_off - str_remain); data/fis-gtm-6.3-007/sr_unix_cm/rc_srvc_xct.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *cpte, msg[OUT_LINE], *p, *tptr; data/fis-gtm-6.3-007/sr_unix_cm/rc_srvc_xct.c:239:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tptr, cptr->xptr, ((rc_q_hdr data/fis-gtm-6.3-007/sr_unix_gnp/cmi_open.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hn[MAX_HOST_NAME_LEN]; data/fis-gtm-6.3-007/sr_unix_gnp/cmi_open.c:134:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((struct sockaddr *)(&lnk->peer_sas), ai_ptr->ai_addr, ai_ptr->ai_addrlen); data/fis-gtm-6.3-007/sr_unix_gnp/cmi_open.c:135:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&lnk->peer_ai, ai_ptr, SIZEOF(struct addrinfo)); data/fis-gtm-6.3-007/sr_unix_gnp/cmi_peer_info.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[SA_MAXLITLEN]; data/fis-gtm-6.3-007/sr_unix_gnp/cmi_peer_info.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipname[SA_MAXLEN]; data/fis-gtm-6.3-007/sr_unix_gnp/cmi_peer_info.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_str[NI_MAXSERV]; data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getsockaddr.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_str[MAX_HOST_NAME_LEN], *port_str_ptr; data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getsockaddr.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hn[MAX_HOST_NAME_LEN]; data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getsockaddr.c:105:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(port_str, port_str_ptr, port_len); data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getsockaddr.c:125:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hn, CMI_DESC_POINTER(nod), CMI_DESC_LENGTH(nod)); data/fis-gtm-6.3-007/sr_unix_gnp/cmj_incoming_call.c:63:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&lnk->peer_sas, &sas, sz); data/fis-gtm-6.3-007/sr_unix_gnp/cmu_getclb.c:45:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (0 == memcpy(ai_ptr->ai_addr, (sockaddr_ptr)(&p->peer_sas), ai_ptr->ai_addrlen)) data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_ch.c:59:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msgnum, sevmsgbuf[2048]; data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_ch.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */ data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_ch.c:99:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sevmsgbuf, TREF(util_outbuff_ptr), msglen); data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_ch.c:121:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mbfptr, msgptr, msglen); data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_exi_ch.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */ data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:26:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newmsg[512]; data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:31:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(newmsg, "Client: "); data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:35:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(newmsg, " - "); data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[32 + 1 + 16 + 1]; data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_server.c:130:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. GBLDEF char gtcm_gnp_server_log[MAX_FN_LEN + 1]; data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_server.c:363:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptr, service[512]; data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_server.c:364:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */ data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_open_cmerrlog.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lfn_path[MAX_TRANS_NAME_LEN + 1]; data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_open_cmerrlog.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_lfn_path[MAX_TRANS_NAME_LEN + 1]; data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:52:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *fname, buff[256]; data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:55:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ch, node[MAX_HOST_NAME_LEN], *tmp_ptr; data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:64:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, fname, len); data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:99:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr->reg->dyn.addr->fname, fname, len); data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:117:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr->reg->rname, node, retlen); data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:124:24: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). } else if (!ptr->reg->open) data/fis-gtm-6.3-007/sr_unix_gnp/gvcmz_errmsg.c:70:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TREF(util_outptr), bufptr, msglen); data/fis-gtm-6.3-007/sr_unix_gnp/gvcmz_errmsg.c:88:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TREF(util_outptr), bufptr, msglen); data/fis-gtm-6.3-007/sr_unix_nsb/rtnhdr.h:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jsb[RHEAD_JSB_SIZE]; data/fis-gtm-6.3-007/sr_unix_nsb/rtnhdr.h:100:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char checksum_128[16]; /* 16-byte MurmurHash3 checksum of routine source code */ data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:31:33: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define SET_OBPT_STR(str, len) (memcpy(obpt, str, len), obpt += len) data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:467:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.source_operand_reg = (char *)register_list[modrm_byte.modrm.r_m + 8 * rex_prefix.Base]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:469:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.destination_operand_reg = (char *)register_list[modrm_byte.modrm.r_m + 8 * rex_prefix.Base]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:473:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.source_operand_reg = (char *)register_list[REG_RIP]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:475:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.destination_operand_reg = (char *)register_list[REG_RIP]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:483:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.source_operand_reg = (char *)register_list[modrm_byte.modrm.reg_opcode + 8 * rex_prefix.Reg]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:485:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.destination_operand_reg = (char *)register_list[modrm_byte.modrm.reg_opcode + 8 * rex_prefix.Reg]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:517:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.opcode_mnemonic = (char *)mnemonic_list[inst_curr_byte]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:648:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.source_operand_reg = (char *) data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:664:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.source_operand_reg = (char *) data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:722:46: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.destination_operand_reg = (char *)register_list[I386_REG_RAX]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:739:46: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.destination_operand_reg = (char *) data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:800:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. instruction.opcode_mnemonic = (char *) mnemonic_list_2b[inst_curr_byte]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:822:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (char *)mnemonic_list_g1[modrm_byte.modrm.reg_opcode]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:831:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (char *)mnemonic_list_g2[modrm_byte.modrm.reg_opcode]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:836:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (char *)mnemonic_list_g3[modrm_byte.modrm.reg_opcode]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:840:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (char *)mnemonic_list_g4[modrm_byte.modrm.reg_opcode]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:845:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (char *)mnemonic_list_g5[modrm_byte.modrm.reg_opcode]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:864:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (char *)register_list[sib_byte.sib.base + 8 * rex_prefix.Base]; data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:867:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (char *)register_list[sib_byte.sib.base + 8 * rex_prefix.Base]; data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:129:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rhead->jsb, (char *)jsb_action, SIZEOF(jsb_action)); /* Action instructions */ data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:130:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rhead->jsb[SIZEOF(jsb_action)], JSB_MARKER, /* Followed by GTM_CODE marker */ data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:158:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((string_tbl + symIndex), static_string_tbl, strEntrySize); data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:161:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((string_tbl + symIndex), GTM_LANG, strEntrySize); data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:164:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((string_tbl + symIndex), GTM_PRODUCT, strEntrySize); data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:167:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((string_tbl + symIndex), GTM_RELEASE_NAME, strEntrySize); data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:238:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((string_tbl + symIndex), module_name.addr, module_name.len); data/fis-gtm-6.3-007/sr_i386/incr_link.c:80:68: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zl_error(file_desc, ERR_INVOBJFILE, fname_len, fname, ERR_TEXT, strlen(STRERROR(save_errno)), data/fis-gtm-6.3-007/sr_i386/incr_link.c:97:68: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zl_error(file_desc, ERR_INVOBJFILE, fname_len, fname, ERR_TEXT, strlen(STRERROR(save_errno)), data/fis-gtm-6.3-007/sr_linux/gtm_getenv.c:33:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(varname); data/fis-gtm-6.3-007/sr_port/cvtparm.c:42:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int siz, cnt, strlen; data/fis-gtm-6.3-007/sr_port/cvtparm.c:118:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen >= 0) data/fis-gtm-6.3-007/sr_port/cvtparm.c:120:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *stringpool.free++ = strlen; data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1298:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chr_p = psa->util_cmd_buff + strlen((char_ptr_t)psa->util_cmd_buff); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:169:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat((char_ptr_t)psa->util_cmd_buff, "="); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:202:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((char_ptr_t)dbfn); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:349:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(SIZEOF(psa->ofhdr.regname) > strlen((char_ptr_t)psa->regname)); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:351:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(SIZEOF(psa->ofhdr.dbfn) > strlen((char_ptr_t)psa->dbc_gv_cur_region->dyn.addr->fname)); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:537:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rec1_gvn_len = strlen((char_ptr_t)rec1_ptr + SIZEOF(rec_hdr)); data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:695:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((char_ptr_t)intgerrmsg); data/fis-gtm-6.3-007/sr_port/dse.h:105:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Y = strlen(X); \ data/fis-gtm-6.3-007/sr_port/ecode_add.c:29:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define INCR_ECODE_INDEX(ecode_index, str, strlen) \ data/fis-gtm-6.3-007/sr_port/ecode_add.c:31:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(dollar_ecode.end, str, strlen); \ data/fis-gtm-6.3-007/sr_port/ecode_add.c:33:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dollar_ecode.array[ecode_index].ecode_str.len = strlen; \ data/fis-gtm-6.3-007/sr_port/eintr_wrappers.h:276:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RC = read(FD, BUF, SIZE); \ data/fis-gtm-6.3-007/sr_port/ext2jnl.c:130:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ext_stop = ptr + strlen(ptr) + 1; data/fis-gtm-6.3-007/sr_port/ext2jnl.c:289:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ptr += (strlen(ptr) + 1); /* get the key-value and data also; can't use strtok since there might be '\\' in the subscript */ data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:69:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define STRLEN(X) ((int)(strlen(X))) data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:70:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define USTRLEN(X) ((unsigned int)(strlen(X))) data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:75:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define STRLEN(X) strlen(X) data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:76:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define USTRLEN(X) strlen(X) data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:90:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define LENGTH_AND_STRING(STRING) (strlen((char *)(STRING))), (STRING) data/fis-gtm-6.3-007/sr_port/gtm_string.h:23:40: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). #define STRNCPY_STR(DEST, STRING, LEN) strncpy((char *)(DEST), (char *)(STRING), LEN) data/fis-gtm-6.3-007/sr_port/gtm_string.h:31:36: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. #define STRNCAT(DEST, SOURCE, LEN) strncat((char *)DEST, (const char *)SOURCE, (size_t)LEN) data/fis-gtm-6.3-007/sr_port/gtm_un.h:19:73: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define SUN_LEN(ptr) ((size_t) (((struct sockaddr_un *) 0)->sun_path) + strlen ((ptr)->sun_path)) data/fis-gtm-6.3-007/sr_port/gtmrecv_statslog.c:68:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("ON") : strlen("OFF"), gtmrecv_options.statslog ? "ON" : "OFF"); data/fis-gtm-6.3-007/sr_port/gtmrecv_statslog.c:68:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("ON") : strlen("OFF"), gtmrecv_options.statslog ? "ON" : "OFF"); data/fis-gtm-6.3-007/sr_port/gvn2gds.c:202:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(c) <= MAX_LEN_FOR_CHAR_FUNC - 1); data/fis-gtm-6.3-007/sr_port/io.h:204:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int (*read)(mval *, int4); data/fis-gtm-6.3-007/sr_port/io.h:264:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ioxx(read); data/fis-gtm-6.3-007/sr_port/iosocket_bind.c:302:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&dsocketptr->iod->dollar.key[len], ((struct sockaddr_un *)(socketptr->local.sa))->sun_path, data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:562:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&iod->dollar.key[len], sockptr->remote.saddr_ip, DD_BUFLEN - 1 - len); data/fis-gtm-6.3-007/sr_port/iosocket_handle.c:58:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *len = (short)strlen(handle); data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:442:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&iod->dollar.key[len], socketptr->remote.saddr_ip, DD_BUFLEN - 1 - len); data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:452:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&dsocketptr->iod->dollar.key[len], charptr, DD_BUFLEN - len - 1); data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:605:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&dsocketptr->iod->dollar.key[len], newsocketptr->remote.saddr_ip, DD_BUFLEN - 1 - len); data/fis-gtm-6.3-007/sr_port/jobinterrupt_process_cleanup.c:71:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mbptr = msgbuf + strlen((char *)msgbuf); data/fis-gtm-6.3-007/sr_port/lke_showlock.c:192:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). f[5] = strlen(gtcmbuf); data/fis-gtm-6.3-007/sr_port/mdef.h:341:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define mid_len(name) strlen(&(name)->c[0]) /* callers of mid_len should include gtm_string.h as well */ data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:414:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(trees->key) == trees->keysize); data/fis-gtm-6.3-007/sr_port/mu_interactive.c:41:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(res); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:623:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (orig_buff_size <= (tempdir_full.len + strlen(tempnam_prefix) + SIZEOF(uint4))) data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1376:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(rptr->backup_tempfile)); data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1377:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sbufh_p->tempfilename[strlen(rptr->backup_tempfile)] = 0; data/fis-gtm-6.3-007/sr_port/mupip_integ.c:540:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(trees->keysize == strlen(trees->key)); data/fis-gtm-6.3-007/sr_port/mur_get_options.c:182:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mur_options.extr_fn[extr_type], qual_buffer, length); data/fis-gtm-6.3-007/sr_port/mur_output_show.c:92:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(LENGTH_OF_TIME >= strlen(string)); data/fis-gtm-6.3-007/sr_port/op_fnview.c:379:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). VARLSTCNT(4) ERR_VIEWFN, 2, strlen((const char *)vtp->keyword), vtp->keyword); data/fis-gtm-6.3-007/sr_port/op_fnview.c:669:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). VARLSTCNT(4) ERR_VIEWFN, 2, strlen((const char *)vtp->keyword), vtp->keyword); data/fis-gtm-6.3-007/sr_port/op_fnview.c:808:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rts_error_csa(CSA_ARG(NULL) VARLSTCNT(4) ERR_VIEWFN, 2, strlen((const char *)vtp->keyword), vtp->keyword); data/fis-gtm-6.3-007/sr_port/op_fnztrigger.c:237:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(filename, arg1->str.addr, arg1->str.len); data/fis-gtm-6.3-007/sr_port/op_gvorder.c:262:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(map->gvkey.addr) == map->gvname_len); data/fis-gtm-6.3-007/sr_port/op_read.c:69:39: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). stat = (io_curr_device.in->disp_ptr->read)(v, msec_timeout); data/fis-gtm-6.3-007/sr_port/op_rhdaddr.c:42:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ERR_ZLMODULE, 2, strlen(&zlink_mname.c[0]), zlink_mname.c); \ data/fis-gtm-6.3-007/sr_port/op_rhdaddr.c:55:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ERR_ZLMODULE, 2, strlen(&zlink_mname.c[0]), &zlink_mname); \ data/fis-gtm-6.3-007/sr_port/op_setzextract.c:40:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t strlen, padlen; data/fis-gtm-6.3-007/sr_port/op_setzextract.c:79:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (MAX_STRLEN < strlen) data/fis-gtm-6.3-007/sr_port/op_setzextract.c:81:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ENSURE_STP_FREE_SPACE((int)strlen); data/fis-gtm-6.3-007/sr_port/op_setzextract.c:106:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(IS_AT_END_OF_STRINGPOOL(straddr, -strlen)); data/fis-gtm-6.3-007/sr_port/op_view.c:849:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rts_error_csa(CSA_ARG(NULL) VARLSTCNT(4) ERR_VIEWCMD, 2, strlen((const char *)vtp->keyword), vtp->keyword); data/fis-gtm-6.3-007/sr_port/op_zprevious.c:251:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(prev_map->gvkey.addr) == prev_map->gvname_len); data/fis-gtm-6.3-007/sr_port/op_zsystem.c:100:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(filtered_command.address)) /*empty command returned*/ data/fis-gtm-6.3-007/sr_port/parse_trctbl_groups.c:72:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(gtm_trcgrp_names[grpindx]) == grplen) data/fis-gtm-6.3-007/sr_port/repl_filter.c:661:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extr_len = strlen(FILTER_EOT); data/fis-gtm-6.3-007/sr_port/repl_filter.c:797:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r_len = read(repl_filter_srv_fd[READ_END], srv_read_end, buff_remaining); data/fis-gtm-6.3-007/sr_port/secshr_send_DBCLNUPINFO_msg.c:45:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(ARRAYSIZE(secshr_string) > strlen(secshr_string)); data/fis-gtm-6.3-007/sr_port/tcp_open.c:102:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). host_len = strlen(host); data/fis-gtm-6.3-007/sr_port/tcp_open.c:120:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). addr_len = strlen(host); data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:193:46: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (recvpool_ctl->write == upd_proc_local->read) data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:196:38: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). pre_read_offset, upd_proc_local->read, recvpool_ctl->write); data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:243:41: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (pre_read_offset < upd_proc_local->read && !recvpool_ctl->wrapped) data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:246:38: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). pre_read_offset = upd_proc_local->read; data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:273:42: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). pre_read_offset, upd_proc_local->read)) data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:280:95: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). REPL_DPRINT3("First one::pre_read_offset = %x read %x\n", pre_read_offset, upd_proc_local->read); data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:285:95: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). REPL_DPRINT3("Non-first::pre_read_offset = %x read %x\n", pre_read_offset, upd_proc_local->read); data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:305:98: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (IS_GOOD_RECORD(rec, rec_len, readaddrs, limit_readaddrs, pre_read_offset, upd_proc_local->read)) data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:357:75: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((readaddrs + rec_len > recvpool.recvdata_base + upd_proc_local->read data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:423:38: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). pre_read_offset, upd_proc_local->read, write_wrap, lcl_write, rec_len); data/fis-gtm-6.3-007/sr_port/updproc.c:447:35: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). assert(0 == upd_proc_local->read); data/fis-gtm-6.3-007/sr_port/updproc.c:592:30: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). temp_read = upd_proc_local->read; data/fis-gtm-6.3-007/sr_port/updproc.c:674:71: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). && (temp_write = recvpool.recvpool_ctl->write) == upd_proc_local->read)) data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:79:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword); data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:91:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword); data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:144:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword); data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:207:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword); data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:242:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword); data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:259:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword); data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:389:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword); data/fis-gtm-6.3-007/sr_port/zshow_output.c:219:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = MIN(strlen(piecestr), MAX_MIDENT_LEN); data/fis-gtm-6.3-007/sr_port/zshow_output.c:224:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mv_child->str.addr, piecestr, len); data/fis-gtm-6.3-007/sr_port/zshow_output.c:368:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = MIN(strlen(piecestr), MAX_MIDENT_LEN); data/fis-gtm-6.3-007/sr_port/zshow_output.c:372:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mv_child->str.addr, piecestr, len); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_clearreq.c:105:10: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). res = getchar(); data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_order.c:132:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((PRE_V5_MAX_MIDENT_LEN < strlen((char *)gv_altkey->base)) && !curr_entry->client_supports_long_names) data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_zprevious.c:127:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((PRE_V5_MAX_MIDENT_LEN < strlen((char *)gv_altkey->base)) && !curr_entry->client_supports_long_names) data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c:50:87: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!((link_info *)lnk->usr)->server_supports_long_names && (PRE_V5_MAX_MIDENT_LEN < strlen((char *)gv_currkey->base))) data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c:62:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy((env_top + strlen(GTM_CALLIN_START_ENV)), gtmvectortable_address, address_len); data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c:63:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *(env_top + strlen(GTM_CALLIN_START_ENV) + address_len) = '\0'; data/fis-gtm-6.3-007/sr_unix/cli.c:48:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:49:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_str, entry, SIZEOF(local_str) - 1); data/fis-gtm-6.3-007/sr_unix/cli.c:79:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:80:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_str, entry, SIZEOF(local_str) - 1); data/fis-gtm-6.3-007/sr_unix/cli.c:110:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:111:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_str, entry, SIZEOF(local_str) - 1); data/fis-gtm-6.3-007/sr_unix/cli.c:141:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:142:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_str, entry, SIZEOF(local_str) - 1); data/fis-gtm-6.3-007/sr_unix/cli.c:172:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:173:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_str, entry, SIZEOF(local_str) - 1); data/fis-gtm-6.3-007/sr_unix/cli.c:203:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:204:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_str, entry, SIZEOF(local_str) - 1); data/fis-gtm-6.3-007/sr_unix/cli.c:235:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:236:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_str, entry, SIZEOF(local_str) - 1); data/fis-gtm-6.3-007/sr_unix/cli.c:273:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:285:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). copylen = strlen(buf); data/fis-gtm-6.3-007/sr_unix/cli.c:318:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:319:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_str, entry, SIZEOF(local_str) - 1); data/fis-gtm-6.3-007/sr_unix/cli.c:324:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (*dst = 0, factor = 10, cp = buf + strlen(buf) - 1; cp >= buf; cp--) data/fis-gtm-6.3-007/sr_unix/cli.c:364:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert (strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:365:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_str, entry, SIZEOF(local_str) - 1); data/fis-gtm-6.3-007/sr_unix/cli.c:407:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert (strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:408:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_str, entry, SIZEOF(local_str) - 1); data/fis-gtm-6.3-007/sr_unix/cli.c:443:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(entry) > 0); data/fis-gtm-6.3-007/sr_unix/cli.c:444:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_str, entry, SIZEOF(local_str) - 1); data/fis-gtm-6.3-007/sr_unix/cli_disallow.c:184:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cli_err_str_ptr = cli_err_str + strlen(cli_err_str); data/fis-gtm-6.3-007/sr_unix/cli_lex.c:468:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). in_len = strlen(cli_fgets_buffer); data/fis-gtm-6.3-007/sr_unix/cli_lex.c:523:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((NULL == cli_lex_in_ptr->tp) || (1 > strlen(cli_lex_in_ptr->tp))) data/fis-gtm-6.3-007/sr_unix/cli_lex.c:563:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (((char *) NULL == cli_lex_in_ptr->tp) || (!strlen(cli_lex_in_ptr->tp))) data/fis-gtm-6.3-007/sr_unix/cli_lex.c:577:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(cli_lex_in_ptr->tp)) data/fis-gtm-6.3-007/sr_unix/cli_lex.c:603:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(cli_lex_in_ptr->in_str, " "); data/fis-gtm-6.3-007/sr_unix/cli_lex.c:623:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((NULL == cli_lex_in_ptr->tp) || (1 > strlen(cli_lex_in_ptr->tp))) data/fis-gtm-6.3-007/sr_unix/cli_lex.c:662:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufend = local_p + strlen(p); data/fis-gtm-6.3-007/sr_unix/cli_parse.c:94:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (strlen(cmd_parms->name) > 0) data/fis-gtm-6.3-007/sr_unix/cli_parse.c:154:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str_len = strlen(str); data/fis-gtm-6.3-007/sr_unix/cli_parse.c:155:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (0 < strlen(sp = (pparm + ind)->name)) data/fis-gtm-6.3-007/sr_unix/cli_parse.c:176:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (str_len == strlen(sp)) data/fis-gtm-6.3-007/sr_unix/cli_parse.c:237:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for(ind =0; 0 < strlen((pparm + ind)->name); ind++) data/fis-gtm-6.3-007/sr_unix/cli_parse.c:309:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TAREF1(parm_str_len, TREF(parms_cnt)) = strlen(cli_token_buf) + 1; data/fis-gtm-6.3-007/sr_unix/cli_parse.c:854:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert (tmp_ptr + 1 < local_str + strlen(local_str)); data/fis-gtm-6.3-007/sr_unix/cli_parse.c:940:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(parm_vals[ind].name); data/fis-gtm-6.3-007/sr_unix/cli_parse.c:994:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (0 < strlen(sp = (gpcmd_parm_vals + ind)->name)) /* implicit assignment intended */ data/fis-gtm-6.3-007/sr_unix/cmidefsp.h:58:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define CMI_DESC_CONST(DESC,LIT) (DESC)->len = strlen(LEN);(DESC)->addr = (LIT) data/fis-gtm-6.3-007/sr_unix/cmidefsp.h:83:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). } read,write; data/fis-gtm-6.3-007/sr_unix/dbfilop.c:85:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CHECK_DB_ENDIAN((sgmnt_data_ptr_t)fc->op_buff, strlen(udi->fn), data/fis-gtm-6.3-007/sr_unix/dm_read.c:370:31: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). else if (0 > (status = (int)read(tt_ptr->fildes, &inbyte, 1))) data/fis-gtm-6.3-007/sr_unix/dm_read.c:471:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL)); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/dm_read.c:537:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (((strlen(REC) == match_length) || (strlen(RECALL) == match_length)) data/fis-gtm-6.3-007/sr_unix/dm_read.c:537:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (((strlen(REC) == match_length) || (strlen(RECALL) == match_length)) data/fis-gtm-6.3-007/sr_unix/dm_read.c:548:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL)); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/dm_read.c:549:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL)); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/dm_read.c:567:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL)); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/dm_read.c:569:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL)); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/dm_read.c:637:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen((char *)recall_error_msg[err_recall])); data/fis-gtm-6.3-007/sr_unix/dm_read.c:638:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL)); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/dm_read.c:639:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL)); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/dm_read.c:957:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL)); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/dse_open.c:103:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). util_out_print("Current output file: !AD", TRUE, strlen(patch_ofile), &patch_ofile[0]); data/fis-gtm-6.3-007/sr_unix/dse_open.c:164:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). util_out_print("Current output file: !AD", TRUE, strlen(patch_ofile), &patch_ofile[0]); data/fis-gtm-6.3-007/sr_unix/fgncalsp.h:37:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(err_buf, err_ptr, len); \ data/fis-gtm-6.3-007/sr_unix/file_head_read.c:94:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CHECK_DB_ENDIAN(header, strlen(fn), fn); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/getcaps.c:96:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ebc_len = strlen(CAP) + 1; \ data/fis-gtm-6.3-007/sr_unix/getcaps.c:133:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ebc_len = strlen(cap); data/fis-gtm-6.3-007/sr_unix/geteditor.c:47:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(edt) + 1; /* for zero */ data/fis-gtm-6.3-007/sr_unix/gtm.c:61:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(varname); data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:97:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). orig_cmdstr.len = strlen(cli_lex_in_ptr->in_str) - strlen("MUMPS "); data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:97:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). orig_cmdstr.len = strlen(cli_lex_in_ptr->in_str) - strlen("MUMPS "); data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:99:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(orig_cmdstr.addr, cli_lex_in_ptr->in_str + strlen("MUMPS "), orig_cmdstr.len); data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:47:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cmdlen = strlen(command); data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:52:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tok_len = strlen(path_tok); data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:66:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cmdlen = strlen(cmd_path); data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:150:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cwdlen = strlen(cwd); data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:152:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(PUTENV_BPXK_MDUMP_PREFIX)); data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:154:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gtm_core_file = cwdptr = gtm_core_putenv + strlen(PUTENV_BPXK_MDUMP_PREFIX); data/fis-gtm-6.3-007/sr_unix/gtm_filter_command.c:52:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). LEN_AND_LIT(ROUTINE), strlen(err_str), err_str); \ data/fis-gtm-6.3-007/sr_unix/gtm_filter_command.c:54:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(err_str), err_str); \ data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:135:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trcsuffix = newname + strlen(newname); /* point to null at end of line */ data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:52:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp += strlen(ERR_TAG); data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:63:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). m_len = strlen(msgp); data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:66:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). m_len += (faclen = strlen(fac)); data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:68:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). m_len += (taglen = strlen((const char *)tag)); data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:328:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((2 == strlen(pieceptr)) && (('0' <= pieceptr[0]) && ('9' >= pieceptr[0])) data/fis-gtm-6.3-007/sr_unix/gtm_main.c:137:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(strlen("MUMPS ") + ptr, ptr, strlen(ptr) + 1); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/gtm_main.c:137:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(strlen("MUMPS ") + ptr, ptr, strlen(ptr) + 1); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/gtm_main.c:150:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!((ptr = GETENV(CHILD_FLAG_ENV)) && strlen(ptr)) && (RESTRICTED(dmode))) /* note assignment */ data/fis-gtm-6.3-007/sr_unix/gtm_main.c:167:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((NULL != (ptr = (char *)getenv(GTM_PASSWD_ENV))) && (0 == strlen(ptr))) data/fis-gtm-6.3-007/sr_unix/gtm_main.c:200:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 != strlen(eq + 1)) data/fis-gtm-6.3-007/sr_unix/gtm_permissions.c:351:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pdd->print_gid_list_len = strlen(pdd->print_gid_list); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:233:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). optionend = charptr + strlen(charptr); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:245:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((optionlen == strlen(opt_table[index].opt_str)) data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:387:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, pwent->passwd, size); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:572:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parse_len = strlen(parse_ptr); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:594:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parse_len = strlen(parse_ptr); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:699:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parse_len = strlen(parse_ptr); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:776:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(env_name_ptr, tlsid, (PASSPHRASE_ENVNAME_MAX - (SIZEOF(GTMTLS_PASSWD_ENV_PREFIX) - 1))); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:887:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(cfg_path, "tls", SIZEOF("tls")); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1001:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parse_len = strlen(parse_ptr); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1029:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parse_len = strlen(parse_ptr); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1132:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (((SIZEOF("PEM") - 1) != strlen(format)) data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1242:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parse_len = strlen(parse_ptr); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1361:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(socket->tlsid, (const char *)id, SIZEOF(socket->tlsid)); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1472:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parse_len = strlen(parse_ptr); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1494:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parse_len = strlen(parse_ptr); data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1683:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(conn_info->protocol, ssl_version_ptr, MAX_ALGORITHM_LEN); data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:96:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(save_libpath, save_libpath_ptr, SIZEOF(save_libpath)); data/fis-gtm-6.3-007/sr_unix/gtm_tparm.c:37:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(c) + 1; data/fis-gtm-6.3-007/sr_unix/gtm_tparm.c:43:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(retptr) + 1; data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:392:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITERC(rtnfd, ERROR_CAUSING_JUNK, strlen(ERROR_CAUSING_JUNK), rc); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:408:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITERC(rtnfd, NEWLINE, strlen(NEWLINE), rc); /* BYPASSOK */ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:320:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). keynamelen = strlen(keyname); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:326:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(lcl_keyname, keyname, keynamelen - STRLEN(EXT_NEW)); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:394:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). search_field_len = strlen(search_field1); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:476:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_length = strlen(curr->key_name); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:509:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_length = strlen(curr->key_path); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:621:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 == (envvar_len = strlen(config_env))) /* inline assignment */ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:648:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(gc_config_filename, config_env, GTM_PATH_MAX); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:725:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_length = strlen(key_name) + 1; data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:802:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_length = strlen(key_name) + 1 + STR_LIT_LEN(EXT_NEW); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:905:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(node->key_name, keyname, GTM_PATH_MAX); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:907:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(node->key_path, keypath, GTM_PATH_MAX); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:184:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(save_libpath, save_libpath_ptr, SIZEOF(save_libpath)); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:195:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pathlen = strlen(ptr); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:207:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pathname, ptr, pathlen); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h:61:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(info->version); \ data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:167:27: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((-1 == (status = read(fd, &c, 1))) && (EINTR == errno)) data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:350:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(env_name, name, SIZEOF(pwent->env_name)); data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h:114:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define ELLIPSIZE(STR) STR, (strlen(STR) > MAX_GTMCRYPT_STR_ARG_LEN ? "..." : "") data/fis-gtm-6.3-007/sr_unix/gtmio.h:76:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define DOREAD_A read data/fis-gtm-6.3-007/sr_unix/gtmio.h:451:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (-1 != (gtmioStatus = read(FDESC, gtmioBuff, gtmioBuffLen))) \ data/fis-gtm-6.3-007/sr_unix/gtmio.h:478:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (-1 != (gtmioStatus = read(FDESC, gtmioBuff, gtmioBuffLen))) \ data/fis-gtm-6.3-007/sr_unix/gtmio.h:513:30: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (-1 != (gtmioStatus = read(FDESC, gtmioBuff, 1))) \ data/fis-gtm-6.3-007/sr_unix/gtmio.h:551:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (-1 != (gtmioStatus = read(FDESC, gtmioBuff, gtmioBuffLen))) \ data/fis-gtm-6.3-007/sr_unix/gtmio.h:855:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RC = getc(STREAM); \ data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:191:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). volatile uint4 read; /* Relative offset from recvdata_base_off of the next journal record to be data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:610:72: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). space_used = write_pos + recvpool_size - (read_pos = upd_proc_local->read); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:612:56: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). space_used = write_pos - (read_pos = upd_proc_local->read); data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1620:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). upd_read = upd_proc_local->read; data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1631:30: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). upd_read = upd_proc_local->read; data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1646:25: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (upd_proc_local->read != recvpool_ctl->write) data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:295:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ('a' <= client_addr.sun_path[strlen(client_addr.sun_path) - 1]) data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:453:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(0); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:156:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). srclen = strlen(src); data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:311:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (strlen(env_var_ptr) + STR_LIT_LEN(SUB_PATH_TO_GTMSECSHRDIR) + STR_LIT_LEN(GTMSECSHR_BASENAME))) data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:335:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (MAX_ALLOWABLE_LEN < strlen(env_var_ptr)) data/fis-gtm-6.3-007/sr_unix/gtmsource.h:428:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). uint4 read; /* Offset relative to jnldata_base_off of the next journal record from the pool */ data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:200:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). port_len = strlen(++c); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:707:31: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). cur_read = gtmsource_local->read; data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:826:66: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). INT8_PRINT(gtmsource_local->read_addr), gtmsource_local->read); data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:841:99: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). REPL_DPRINT3(" read : %d corresponding to save_read_jnl_seqno : "INT8_FMT"\n", gtmsource_local->read, data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:2089:45: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). INT8_PRINT(read_addr), gtmsource_local->read); data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:58:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int64_t read, wrap_size; /* This can be negative. Must handle a signed 4G value */ data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:80:27: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read = gtmsource_local->read; data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:98:51: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). jnl_header = (jnldata_hdr_ptr_t)(jnldata_base + read); data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:236:55: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). REPL_DPRINT4("Read %u : Next read : %ld : %s\n", read, data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:276:30: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). gtmsource_local->read = read; data/fis-gtm-6.3-007/sr_unix/gtmsource_statslog.c:61:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("ON") : strlen("OFF"), gtmsource_options.statslog ? "ON" : "OFF"); data/fis-gtm-6.3-007/sr_unix/gtmsource_statslog.c:61:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("ON") : strlen("OFF"), gtmsource_options.statslog ? "ON" : "OFF"); data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:185:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(csa->nl->now_running) < SIZEOF(now_running)); \ data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:743:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(machine_name) < MAX_MCNAMELEN); data/fis-gtm-6.3-007/sr_unix/io_open_try.c:413:16: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask_orig = umask(000); /* determine umask (destructive) */ data/fis-gtm-6.3-007/sr_unix/io_open_try.c:414:9: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). (void)umask(umask_orig); /* reset umask */ data/fis-gtm-6.3-007/sr_unix/iob_open_rd.c:66:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). file->path = malloc(strlen(path) + 1); data/fis-gtm-6.3-007/sr_unix/iob_open_wt.c:52:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). file->path = malloc(strlen(path) + 1); data/fis-gtm-6.3-007/sr_unix/iopi_open.c:409:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(filtered_command.address)) /*empty command returned*/ data/fis-gtm-6.3-007/sr_unix/iorm_get.c:164:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). status = read(fildes, &rm_ptr->bom_buf[rm_ptr->bom_buf_cnt], bom_bytes2read - rm_ptr->bom_buf_cnt); data/fis-gtm-6.3-007/sr_unix/iorm_get.c:367:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). status = read(fildes, temp, (int)bytes2read - bytes_count); data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:565:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). status = read(fildes, temp, width - bytes_count); data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:765:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). status = read(fildes, rm_ptr->tmp_buffer, CHUNK_SIZE); data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1284:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). status = read(fildes, rm_ptr->tmp_buffer, CHUNK_SIZE); data/fis-gtm-6.3-007/sr_unix/iott_edit.c:215:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITERC(fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL), ret); data/fis-gtm-6.3-007/sr_unix/iott_edit.c:256:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITERC(fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL), ret); data/fis-gtm-6.3-007/sr_unix/iott_edit.c:341:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITERC(fildes, CURSOR_UP, strlen(CURSOR_UP), ret); data/fis-gtm-6.3-007/sr_unix/iott_edit.c:355:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITERC(fildes, CURSOR_UP, strlen(CURSOR_UP), ret); data/fis-gtm-6.3-007/sr_unix/iott_edit.c:390:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITERC(fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL), ret); data/fis-gtm-6.3-007/sr_unix/iott_edit.c:417:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DOWRITERC(fildes, str, strlen((char *)str), ret); data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:263:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). } else if ((rdlen = (int)(read(tt_ptr->fildes, &inbyte, 1))) == 1) /* This read is protected */ data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:413:33: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). } else if (0 < (rdlen = (int)(read(tt_ptr->fildes, &inbyte, 1)))) /* This read is protected */ data/fis-gtm-6.3-007/sr_unix/jnl_prc_vector.c:77:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (s = c + strlen((char*)c); s > c; --s) data/fis-gtm-6.3-007/sr_unix/jobchild_init.c:86:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((c = GETENV(CHILD_FLAG_ENV)) && strlen(c)) data/fis-gtm-6.3-007/sr_unix/list_file.c:187:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). c_len = (short)strlen(c); data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:202:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(path, file.addr, file.len); data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:328:16: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask_orig = umask(000); /* determine umask (destructive) */ data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:329:9: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). (void)umask(umask_orig); /* reset umask */ data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:152:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gv_cur_region->dyn.addr->fname_len = strlen(fname); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:335:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gv_cur_region->dyn.addr->fname_len = strlen(fname); data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.c:143:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). reg->dyn.addr->fname_len = strlen(instfilename); data/fis-gtm-6.3-007/sr_unix/mu_size_scan.c:85:13: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. boolean_t equal, tn_aborted, verify_reads; data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:731:27: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (0 != (got = (int)(read(bf->fd, curr, needed)))) data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:962:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TRUE, fn_len, fn, strlen("EXISTING"), (pvt_csd->null_subs == ALWAYS) ? data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:979:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("M standard null collation"), data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:82:15: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask_orig = umask(000); /* Determine umask (destructive) */ data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:83:8: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). (void)umask(umask_orig); /* Reset umask */ data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:137:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(!fstr.len || strlen(fstr.addr) == fstr.len); data/fis-gtm-6.3-007/sr_unix/ojchildioset.c:87:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(fname_buf, jparms->params.input.buffer, jparms->params.input.len); data/fis-gtm-6.3-007/sr_unix/ojchildioset.c:123:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(fname_buf, jparms->params.output.buffer, jparms->params.output.len); data/fis-gtm-6.3-007/sr_unix/ojchildioset.c:172:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(fname_buf, jparms->params.error.buffer, jparms->params.error.len); data/fis-gtm-6.3-007/sr_unix/ojchkfs.c:50:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(es, addr, len); data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:122:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(50000); \ data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:425:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(fname_buf, jparms->params.input.buffer, jparms->params.input.len); data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:464:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbuff, jparms->params.directory.buffer, jparms->params.directory.len); data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:739:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbuff, jparms->params.gbldir.buffer, jparms->params.gbldir.len); data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:772:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(env_len <= strlen(*old_env_cur)); data/fis-gtm-6.3-007/sr_unix/op_fnztrnlnm.c:80:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). retlen = strlen(status); data/fis-gtm-6.3-007/sr_unix/op_zlink.c:537:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(cmd_qlf.object_file.str.addr) == cmd_qlf.object_file.str.len); data/fis-gtm-6.3-007/sr_unix/reg_cmcheck.c:44:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(fbuff,file.addr,file.len); data/fis-gtm-6.3-007/sr_unix/relinkctl.c:481:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(ARRAYSIZE(shm_base->relinkctl_fname) > strlen(linkctl->relinkctl_path)); data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:576:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (22 >= strlen(jnlpool_ctl->jnlpool_id.instfilename)) data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:856:56: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). PRINT_OFFSET_PREFIX(offsetof(gtmsource_local_struct, read), SIZEOF(gtmsourcelocal_ptr->read)); data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:856:90: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). PRINT_OFFSET_PREFIX(offsetof(gtmsource_local_struct, read), SIZEOF(gtmsourcelocal_ptr->read)); data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:858:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). gtmsourcelocal_ptr->read, gtmsourcelocal_ptr->read); data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:858:50: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). gtmsourcelocal_ptr->read, gtmsourcelocal_ptr->read); data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:904:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (20 >= strlen(gtmsourcelocal_ptr->secondary_host)) data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:941:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (20 >= strlen(gtmsourcelocal_ptr->log_file)) data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:957:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (20 >= strlen(gtmsourcelocal_ptr->statslog_file)) data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:1012:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (20 >= strlen(gtmsourcelocal_ptr->filter_cmd)) data/fis-gtm-6.3-007/sr_unix/repl_log_init.c:144:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(log), data/fis-gtm-6.3-007/sr_unix/sleep.h:95:4: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(usecs); \ data/fis-gtm-6.3-007/sr_unix/sleep.h:105:4: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(usecs); \ data/fis-gtm-6.3-007/sr_unix/util_input.c:130:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). in_len = strlen(buffer); data/fis-gtm-6.3-007/sr_unix/util_output.c:305:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). message_top = message + strlen(message); data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c:97:20: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((cc = (int)(read(fd, &bptr[blen], cc))) < 0) data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:75:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (curr_conn && (512-strlen(msg)) > 25) data/fis-gtm-6.3-007/sr_unix_cm/gtcm_shmclean.c:191:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (1 != read(0, &resp, 1)) /*unable to read response*/ data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_qry.c:102:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (grp += grl + 1; *grp; grp += strlen(grp) + 1) { data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c:96:42: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (!servtime_expired && (cc = (int)(read(cptr->fd, &cptr->bptr[cptr->blen], cc))) < 0 && errno == EINTR) data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c:139:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((cc = (int)read(cptr->fd, &cptr->bptr[cptr->blen], 4)) <= 0) data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c:146:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((cc = (int)read(cptr->fd, &cptr->bptr[cptr->blen], mlen.value)) <= 0) data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:28:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((SIZEOF(newmsg)-strlen(msg)) > 25) data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:32:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cmi_peer_info(lnk, &newmsg[strlen(newmsg)], SIZEOF(newmsg)-strlen(newmsg)-1); data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:32:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cmi_peer_info(lnk, &newmsg[strlen(newmsg)], SIZEOF(newmsg)-strlen(newmsg)-1); data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:33:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(newmsg) && strlen(newmsg) < (strlen(msg) + 3)) data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:33:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(newmsg) && strlen(newmsg) < (strlen(msg) + 3)) data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:33:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(newmsg) && strlen(newmsg) < (strlen(msg) + 3)) data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_server.c:390:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(ptr + SIZEOF("GTCM_GNP_SERVER ") - 1, ptr, strlen(ptr) + 1); /* BYPASSOK */ ANALYSIS SUMMARY: Hits = 4014 Lines analyzed = 435130 in approximately 13.38 seconds (32533 lines/second) Physical Source Lines of Code (SLOC) = 333746 Hits@level = [0] 74 [1] 335 [2] 3488 [3] 63 [4] 126 [5] 2 Hits@level+ = [0+] 4088 [1+] 4014 [2+] 3679 [3+] 191 [4+] 128 [5+] 2 Hits/KSLOC@level+ = [0+] 12.2488 [1+] 12.0271 [2+] 11.0234 [3+] 0.572292 [4+] 0.383525 [5+] 0.00599258 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.