Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_api.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_types.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/includes.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/types.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_api.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/includes.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/definitions.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_main.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.h
Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_types.h
Examining data/ion-3.2.1+dfsg/bp/ltp/ltpcla.h
Examining data/ion-3.2.1+dfsg/bp/ltp/ltpcli.c
Examining data/ion-3.2.1+dfsg/bp/ltp/ltpclo.c
Examining data/ion-3.2.1+dfsg/bp/udp/libudpcla.c
Examining data/ion-3.2.1+dfsg/bp/udp/udpclo.c
Examining data/ion-3.2.1+dfsg/bp/udp/udpcli.c
Examining data/ion-3.2.1+dfsg/bp/udp/udpcla.h
Examining data/ion-3.2.1+dfsg/bp/cgr/libcgr.c
Examining data/ion-3.2.1+dfsg/bp/library/bpP.h
Examining data/ion-3.2.1+dfsg/bp/library/libbp.c
Examining data/ion-3.2.1+dfsg/bp/library/libbpnm.c
Examining data/ion-3.2.1+dfsg/bp/library/bei.h
Examining data/ion-3.2.1+dfsg/bp/library/bei.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/snid/snid.h
Examining data/ion-3.2.1+dfsg/bp/library/ext/snid/snid.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.h
Examining data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/ecos/ecos.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/ecos/ecos.h
Examining data/ion-3.2.1+dfsg/bp/library/ext/bpextensions.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppib.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.h
Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.h
Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.h
Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppib.h
Examining data/ion-3.2.1+dfsg/bp/library/ext/phn/phn.h
Examining data/ion-3.2.1+dfsg/bp/library/ext/phn/phn.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/noextensions.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.c
Examining data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.h
Examining data/ion-3.2.1+dfsg/bp/library/cgr.h
Examining data/ion-3.2.1+dfsg/bp/library/libbpP.c
Examining data/ion-3.2.1+dfsg/bp/library/acs/acstx.c
Examining data/ion-3.2.1+dfsg/bp/library/acs/acsid.c
Examining data/ion-3.2.1+dfsg/bp/library/acs/acsrx.c
Examining data/ion-3.2.1+dfsg/bp/library/acs/acsappend.c
Examining data/ion-3.2.1+dfsg/bp/library/acs/acsserialize.c
Examining data/ion-3.2.1+dfsg/bp/library/acs/acs.h
Examining data/ion-3.2.1+dfsg/bp/library/acs/acsP.h
Examining data/ion-3.2.1+dfsg/bp/library/bpnm.h
Examining data/ion-3.2.1+dfsg/bp/dccp/dccpcla.h
Examining data/ion-3.2.1+dfsg/bp/dccp/dccpcli.c
Examining data/ion-3.2.1+dfsg/bp/dccp/dccpclo.c
Examining data/ion-3.2.1+dfsg/bp/include/bp.h
Examining data/ion-3.2.1+dfsg/bp/test/bpsource.c
Examining data/ion-3.2.1+dfsg/bp/test/bpchat.c
Examining data/ion-3.2.1+dfsg/bp/test/bpsink.c
Examining data/ion-3.2.1+dfsg/bp/test/bping.c
Examining data/ion-3.2.1+dfsg/bp/test/bpstats2.c
Examining data/ion-3.2.1+dfsg/bp/test/bpcounter.c
Examining data/ion-3.2.1+dfsg/bp/test/bpdriver.c
Examining data/ion-3.2.1+dfsg/bp/test/bpnmtest.c
Examining data/ion-3.2.1+dfsg/bp/test/bpecho.c
Examining data/ion-3.2.1+dfsg/bp/brs/brscla.h
Examining data/ion-3.2.1+dfsg/bp/brs/brsscla.c
Examining data/ion-3.2.1+dfsg/bp/brs/brsccla.c
Examining data/ion-3.2.1+dfsg/bp/daemon/bpclock.c
Examining data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c
Examining data/ion-3.2.1+dfsg/bp/utils/acslist.c
Examining data/ion-3.2.1+dfsg/bp/utils/bptrace.c
Examining data/ion-3.2.1+dfsg/bp/utils/bpadmin.c
Examining data/ion-3.2.1+dfsg/bp/utils/lgsend.c
Examining data/ion-3.2.1+dfsg/bp/utils/lgagent.c
Examining data/ion-3.2.1+dfsg/bp/utils/bprecvfile.c
Examining data/ion-3.2.1+dfsg/bp/utils/bplist.c
Examining data/ion-3.2.1+dfsg/bp/utils/bpcancel.c
Examining data/ion-3.2.1+dfsg/bp/utils/acsadmin.c
Examining data/ion-3.2.1+dfsg/bp/utils/bpstats.c
Examining data/ion-3.2.1+dfsg/bp/utils/bpsendfile.c
Examining data/ion-3.2.1+dfsg/bp/utils/hmackeys.c
Examining data/ion-3.2.1+dfsg/bp/bssp/bsspclo.c
Examining data/ion-3.2.1+dfsg/bp/bssp/bsspcli.c
Examining data/ion-3.2.1+dfsg/bp/bssp/bsspcla.h
Examining data/ion-3.2.1+dfsg/bp/dgr/dgrcla.c
Examining data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c
Examining data/ion-3.2.1+dfsg/bp/ipn/ipnfw.c
Examining data/ion-3.2.1+dfsg/bp/ipn/ipnfw.h
Examining data/ion-3.2.1+dfsg/bp/ipn/ipnadminep.c
Examining data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c
Examining data/ion-3.2.1+dfsg/bp/imc/imcP.h
Examining data/ion-3.2.1+dfsg/bp/imc/imcfw.h
Examining data/ion-3.2.1+dfsg/bp/imc/imcfw.c
Examining data/ion-3.2.1+dfsg/bp/imc/imcadmin.c
Examining data/ion-3.2.1+dfsg/bp/imc/libimcfw.c
Examining data/ion-3.2.1+dfsg/bp/tcp/tcpcli.c
Examining data/ion-3.2.1+dfsg/bp/tcp/stcpclo.c
Examining data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c
Examining data/ion-3.2.1+dfsg/bp/tcp/stcpcli.c
Examining data/ion-3.2.1+dfsg/bp/tcp/tcpclo.c
Examining data/ion-3.2.1+dfsg/bp/tcp/tcpcla.h
Examining data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c
Examining data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c
Examining data/ion-3.2.1+dfsg/bp/dtn2/dtn2adminep.c
Examining data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c
Examining data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.h
Examining data/ion-3.2.1+dfsg/ltp/udp/udplsi.c
Examining data/ion-3.2.1+dfsg/ltp/udp/udplso.c
Examining data/ion-3.2.1+dfsg/ltp/udp/udplsa.h
Examining data/ion-3.2.1+dfsg/ltp/sda/libsda.c
Examining data/ion-3.2.1+dfsg/ltp/library/ltpei.h
Examining data/ion-3.2.1+dfsg/ltp/library/ltpP.h
Examining data/ion-3.2.1+dfsg/ltp/library/ext/ltpextensions.c
Examining data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c
Examining data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.h
Examining data/ion-3.2.1+dfsg/ltp/library/libltpnm.c
Examining data/ion-3.2.1+dfsg/ltp/library/ltpei.c
Examining data/ion-3.2.1+dfsg/ltp/library/libltp.c
Examining data/ion-3.2.1+dfsg/ltp/library/ltpnm.h
Examining data/ion-3.2.1+dfsg/ltp/library/libltpP.c
Examining data/ion-3.2.1+dfsg/ltp/dccp/dccplso.c
Examining data/ion-3.2.1+dfsg/ltp/dccp/dccplsi.c
Examining data/ion-3.2.1+dfsg/ltp/dccp/dccplsa.h
Examining data/ion-3.2.1+dfsg/ltp/include/sda.h
Examining data/ion-3.2.1+dfsg/ltp/include/ltp.h
Examining data/ion-3.2.1+dfsg/ltp/aos/aoslsi.c
Examining data/ion-3.2.1+dfsg/ltp/aos/aoslso.c
Examining data/ion-3.2.1+dfsg/ltp/aos/aoslsa.h
Examining data/ion-3.2.1+dfsg/ltp/test/sdatest.c
Examining data/ion-3.2.1+dfsg/ltp/test/ltpdriver.c
Examining data/ion-3.2.1+dfsg/ltp/test/ltpcounter.c
Examining data/ion-3.2.1+dfsg/ltp/daemon/ltpclock.c
Examining data/ion-3.2.1+dfsg/ltp/daemon/ltpmeter.c
Examining data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c
Examining data/ion-3.2.1+dfsg/arch-android/iondtn/jni/gov_nasa_jpl_iondtn_NodeAdministrator.h
Examining data/ion-3.2.1+dfsg/arch-android/iondtn/jni/mysymtab.c
Examining data/ion-3.2.1+dfsg/arch-android/iondtn/jni/iondtn.c
Examining data/ion-3.2.1+dfsg/arch-android/iondtn/jni/gdslogger.c
Examining data/ion-3.2.1+dfsg/bss/library/libbss.c
Examining data/ion-3.2.1+dfsg/bss/library/libbssP.c
Examining data/ion-3.2.1+dfsg/bss/library/bssP.h
Examining data/ion-3.2.1+dfsg/bss/include/bss.h
Examining data/ion-3.2.1+dfsg/bss/test/bssdriver.c
Examining data/ion-3.2.1+dfsg/bss/test/bssrecv.c
Examining data/ion-3.2.1+dfsg/bss/test/bsscounter.c
Examining data/ion-3.2.1+dfsg/bss/test/bssStreamingApp.c
Examining data/ion-3.2.1+dfsg/bss/test/bsstest.h
Examining data/ion-3.2.1+dfsg/cfdp/bp/bputa.c
Examining data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c
Examining data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h
Examining data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c
Examining data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c
Examining data/ion-3.2.1+dfsg/cfdp/include/cfdpops.h
Examining data/ion-3.2.1+dfsg/cfdp/include/cfdp.h
Examining data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c
Examining data/ion-3.2.1+dfsg/cfdp/daemon/cfdpclock.c
Examining data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c
Examining data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h
Examining data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c
Examining data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c
Examining data/ion-3.2.1+dfsg/restart/utils/ionrestart.c
Examining data/ion-3.2.1+dfsg/ici/sdr/sdrstring.c
Examining data/ion-3.2.1+dfsg/ici/sdr/sdrtable.c
Examining data/ion-3.2.1+dfsg/ici/sdr/sdrhash.c
Examining data/ion-3.2.1+dfsg/ici/sdr/sdrmgt.c
Examining data/ion-3.2.1+dfsg/ici/sdr/sdrP.h
Examining data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c
Examining data/ion-3.2.1+dfsg/ici/sdr/sdrlist.c
Examining data/ion-3.2.1+dfsg/ici/sdr/sdrcatlg.c
Examining data/ion-3.2.1+dfsg/ici/library/rfx.c
Examining data/ion-3.2.1+dfsg/ici/library/lyst.c
Examining data/ion-3.2.1+dfsg/ici/library/memmgr.c
Examining data/ion-3.2.1+dfsg/ici/library/symtab.c
Examining data/ion-3.2.1+dfsg/ici/library/smlist.c
Examining data/ion-3.2.1+dfsg/ici/library/sptrace.c
Examining data/ion-3.2.1+dfsg/ici/library/ionsec.c
Examining data/ion-3.2.1+dfsg/ici/library/lystP.h
Examining data/ion-3.2.1+dfsg/ici/library/smrbt.c
Examining data/ion-3.2.1+dfsg/ici/library/llcv.c
Examining data/ion-3.2.1+dfsg/ici/library/platform_sm.c
Examining data/ion-3.2.1+dfsg/ici/library/zco.c
Examining data/ion-3.2.1+dfsg/ici/library/platform.c
Examining data/ion-3.2.1+dfsg/ici/library/ion.c
Examining data/ion-3.2.1+dfsg/ici/library/psm.c
Examining data/ion-3.2.1+dfsg/ici/library/libicinm.c
Examining data/ion-3.2.1+dfsg/ici/library/icinm.h
Examining data/ion-3.2.1+dfsg/ici/include/lyst.h
Examining data/ion-3.2.1+dfsg/ici/include/psm.h
Examining data/ion-3.2.1+dfsg/ici/include/sdrmgt.h
Examining data/ion-3.2.1+dfsg/ici/include/crypto.h
Examining data/ion-3.2.1+dfsg/ici/include/sdrhash.h
Examining data/ion-3.2.1+dfsg/ici/include/sdrlist.h
Examining data/ion-3.2.1+dfsg/ici/include/sdrstring.h
Examining data/ion-3.2.1+dfsg/ici/include/ionsec.h
Examining data/ion-3.2.1+dfsg/ici/include/sdrtable.h
Examining data/ion-3.2.1+dfsg/ici/include/sptrace.h
Examining data/ion-3.2.1+dfsg/ici/include/rfx.h
Examining data/ion-3.2.1+dfsg/ici/include/smlist.h
Examining data/ion-3.2.1+dfsg/ici/include/platform_sm.h
Examining data/ion-3.2.1+dfsg/ici/include/llcv.h
Examining data/ion-3.2.1+dfsg/ici/include/smrbt.h
Examining data/ion-3.2.1+dfsg/ici/include/sdrxn.h
Examining data/ion-3.2.1+dfsg/ici/include/sdr.h
Examining data/ion-3.2.1+dfsg/ici/include/zco.h
Examining data/ion-3.2.1+dfsg/ici/include/memmgr.h
Examining data/ion-3.2.1+dfsg/ici/include/platform.h
Examining data/ion-3.2.1+dfsg/ici/include/ion.h
Examining data/ion-3.2.1+dfsg/ici/include/icinm.h
Examining data/ion-3.2.1+dfsg/ici/test/sm2file.c
Examining data/ion-3.2.1+dfsg/ici/test/sdr2file.c
Examining data/ion-3.2.1+dfsg/ici/test/smlistsh.c
Examining data/ion-3.2.1+dfsg/ici/test/psmshell.c
Examining data/ion-3.2.1+dfsg/ici/test/owlttb.c
Examining data/ion-3.2.1+dfsg/ici/test/file2sm.c
Examining data/ion-3.2.1+dfsg/ici/test/file2sdr.h
Examining data/ion-3.2.1+dfsg/ici/test/smrbtsh.c
Examining data/ion-3.2.1+dfsg/ici/test/owltsim.c
Examining data/ion-3.2.1+dfsg/ici/test/file2sdr.c
Examining data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c
Examining data/ion-3.2.1+dfsg/ici/crypto/sample_crypto.h
Examining data/ion-3.2.1+dfsg/ici/daemon/rfxclock.c
Examining data/ion-3.2.1+dfsg/ici/daemon/winion.c
Examining data/ion-3.2.1+dfsg/ici/utils/sdrwatch.c
Examining data/ion-3.2.1+dfsg/ici/utils/ionexit.c
Examining data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c
Examining data/ion-3.2.1+dfsg/ici/utils/sdrmend.c
Examining data/ion-3.2.1+dfsg/ici/utils/psmwatch.c
Examining data/ion-3.2.1+dfsg/ici/utils/ionwarn.c
Examining data/ion-3.2.1+dfsg/ici/utils/killm.c
Examining data/ion-3.2.1+dfsg/ici/utils/ionadmin.c
Examining data/ion-3.2.1+dfsg/dtpc/library/dtpcP.h
Examining data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c
Examining data/ion-3.2.1+dfsg/dtpc/library/libdtpc.c
Examining data/ion-3.2.1+dfsg/dtpc/include/dtpc.h
Examining data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c
Examining data/ion-3.2.1+dfsg/dtpc/test/dtpcreceive.c
Examining data/ion-3.2.1+dfsg/dtpc/daemon/dtpcd.c
Examining data/ion-3.2.1+dfsg/dtpc/daemon/dtpcclock.c
Examining data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c
Examining data/ion-3.2.1+dfsg/tests/1400.loopback-stcp/dotest.c
Examining data/ion-3.2.1+dfsg/tests/1300.loopback-tcp/dotest.c
Examining data/ion-3.2.1+dfsg/tests/1000.loopback/dotest.c
Examining data/ion-3.2.1+dfsg/tests/bug-0015-tcpclo-bpcp-sig-handling/test.c
Examining data/ion-3.2.1+dfsg/tests/issue-279-bpMemo-timeline/driver.c
Examining data/ion-3.2.1+dfsg/tests/library/check.h
Examining data/ion-3.2.1+dfsg/tests/library/check.c
Examining data/ion-3.2.1+dfsg/tests/library/ionstop.c
Examining data/ion-3.2.1+dfsg/tests/library/ionstart.c
Examining data/ion-3.2.1+dfsg/tests/library/testutil.h
Examining data/ion-3.2.1+dfsg/tests/library/paths.c
Examining data/ion-3.2.1+dfsg/tests/issue-330-cfdpclock-FDU-removal/cfdplisten.c
Examining data/ion-3.2.1+dfsg/tests/issue-260-teach-valgrind-mtake/domtake.c
Examining data/ion-3.2.1+dfsg/tests/issue-333-cfdp-orig-ID-type/send.c
Examining data/ion-3.2.1+dfsg/tests/issue-188-common-cos-syntax/dotest.c
Examining data/ion-3.2.1+dfsg/tests/1500.loopback-brs/dotest.c
Examining data/ion-3.2.1+dfsg/tests/issue-334-cfdp-transaction-id/dotest.c
Examining data/ion-3.2.1+dfsg/arch-rtems/pmqlsi.c
Examining data/ion-3.2.1+dfsg/arch-rtems/pmqlsa.h
Examining data/ion-3.2.1+dfsg/arch-rtems/mysymtab.c
Examining data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c
Examining data/ion-3.2.1+dfsg/arch-rtems/pmqlso.c
Examining data/ion-3.2.1+dfsg/arch-rtems/gdslogger.c
Examining data/ion-3.2.1+dfsg/bssp/udp/udpbsa.h
Examining data/ion-3.2.1+dfsg/bssp/udp/udpbsi.c
Examining data/ion-3.2.1+dfsg/bssp/udp/udpbso.c
Examining data/ion-3.2.1+dfsg/bssp/library/libbssp.c
Examining data/ion-3.2.1+dfsg/bssp/library/libbsspP.c
Examining data/ion-3.2.1+dfsg/bssp/library/bsspP.h
Examining data/ion-3.2.1+dfsg/bssp/include/bssp.h
Examining data/ion-3.2.1+dfsg/bssp/daemon/bsspclock.c
Examining data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c
Examining data/ion-3.2.1+dfsg/bssp/tcp/libtcpbsa.c
Examining data/ion-3.2.1+dfsg/bssp/tcp/tcpbso.c
Examining data/ion-3.2.1+dfsg/bssp/tcp/tcpbsi.c
Examining data/ion-3.2.1+dfsg/bssp/tcp/tcpbsa.h
Examining data/ion-3.2.1+dfsg/dgr/library/libdgr.c
Examining data/ion-3.2.1+dfsg/dgr/include/dgr.h
Examining data/ion-3.2.1+dfsg/dgr/test/file2tcp.h
Examining data/ion-3.2.1+dfsg/dgr/test/file2dgr.c
Examining data/ion-3.2.1+dfsg/dgr/test/udp2file.c
Examining data/ion-3.2.1+dfsg/dgr/test/tcp2file.c
Examining data/ion-3.2.1+dfsg/dgr/test/file2tcp.c
Examining data/ion-3.2.1+dfsg/dgr/test/file2udp.h
Examining data/ion-3.2.1+dfsg/dgr/test/file2udp.c
Examining data/ion-3.2.1+dfsg/dgr/test/file2dgr.h
Examining data/ion-3.2.1+dfsg/dgr/test/dgr2file.c
Examining data/ion-3.2.1+dfsg/ams/rams/librams.c
Examining data/ion-3.2.1+dfsg/ams/rams/ramsgate.c
Examining data/ion-3.2.1+dfsg/ams/rams/ramscommon.h
Examining data/ion-3.2.1+dfsg/ams/rams/rams.h
Examining data/ion-3.2.1+dfsg/ams/rams/ramscommon.c
Examining data/ion-3.2.1+dfsg/ams/library/loadmib.c
Examining data/ion-3.2.1+dfsg/ams/library/udpts.c
Examining data/ion-3.2.1+dfsg/ams/library/amsP.h
Examining data/ion-3.2.1+dfsg/ams/library/tcpts.c
Examining data/ion-3.2.1+dfsg/ams/library/vmqts.c
Examining data/ion-3.2.1+dfsg/ams/library/amsd.c
Examining data/ion-3.2.1+dfsg/ams/library/amscommon.h
Examining data/ion-3.2.1+dfsg/ams/library/crypt.c
Examining data/ion-3.2.1+dfsg/ams/library/libams.c
Examining data/ion-3.2.1+dfsg/ams/library/amscommon.c
Examining data/ion-3.2.1+dfsg/ams/library/dgrts.c
Examining data/ion-3.2.1+dfsg/ams/library/default.marshal.c
Examining data/ion-3.2.1+dfsg/ams/library/default.crypt.c
Examining data/ion-3.2.1+dfsg/ams/library/marshal.c
Examining data/ion-3.2.1+dfsg/ams/include/ams.h
Examining data/ion-3.2.1+dfsg/ams/test/amspubsub.c
Examining data/ion-3.2.1+dfsg/ams/test/amslog.c
Examining data/ion-3.2.1+dfsg/ams/test/amslogprt.c
Examining data/ion-3.2.1+dfsg/ams/test/amsbenchs.c
Examining data/ion-3.2.1+dfsg/ams/test/amshello.c
Examining data/ion-3.2.1+dfsg/ams/test/amsbenchr.c
Examining data/ion-3.2.1+dfsg/ams/test/amsshell.c
Examining data/ion-3.2.1+dfsg/ams/utils/amsmib.c
Examining data/ion-3.2.1+dfsg/ams/utils/amsstop.c
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/instr.c
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/def.c
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/report.h
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/admin.h
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/def.h
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/instr.h
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/report.c
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/rules.c
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/admin.c
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/mid.h
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/oid.h
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/rules.h
Examining data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c
Examining data/ion-3.2.1+dfsg/nm/shared/utils/db.c
Examining data/ion-3.2.1+dfsg/nm/shared/utils/nm_types.h
Examining data/ion-3.2.1+dfsg/nm/shared/utils/expr.h
Examining data/ion-3.2.1+dfsg/nm/shared/utils/ion_if.c
Examining data/ion-3.2.1+dfsg/nm/shared/utils/db.h
Examining data/ion-3.2.1+dfsg/nm/shared/utils/debug.h
Examining data/ion-3.2.1+dfsg/nm/shared/utils/expr.c
Examining data/ion-3.2.1+dfsg/nm/shared/utils/ion_if.h
Examining data/ion-3.2.1+dfsg/nm/shared/utils/utils.h
Examining data/ion-3.2.1+dfsg/nm/shared/utils/utils.c
Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.h
Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_ltp.c
Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm.h
Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c
Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_ltp.h
Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c
Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_agent.h
Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_agent.c
Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.h
Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm.c
Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_def.c
Examining data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c
Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c
Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_def.h
Examining data/ion-3.2.1+dfsg/nm/shared/msg/pdu.h
Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.h
Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.h
Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c
Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.h
Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c
Examining data/ion-3.2.1+dfsg/nm/agent/ldc.c
Examining data/ion-3.2.1+dfsg/nm/agent/ldc.h
Examining data/ion-3.2.1+dfsg/nm/agent/lcc.c
Examining data/ion-3.2.1+dfsg/nm/agent/adm_agent_priv.h
Examining data/ion-3.2.1+dfsg/nm/agent/nmagent.c
Examining data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c
Examining data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c
Examining data/ion-3.2.1+dfsg/nm/agent/ingest.h
Examining data/ion-3.2.1+dfsg/nm/agent/nmagent.h
Examining data/ion-3.2.1+dfsg/nm/agent/lcc.h
Examining data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.h
Examining data/ion-3.2.1+dfsg/nm/agent/rda.h
Examining data/ion-3.2.1+dfsg/nm/agent/ingest.c
Examining data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.h
Examining data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.h
Examining data/ion-3.2.1+dfsg/nm/agent/adm_agent_priv.c
Examining data/ion-3.2.1+dfsg/nm/agent/rda.c
Examining data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c
Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr.h
Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr.c
Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c
Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.h
Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.h
Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_rx.c
Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c

FINAL RESULTS:

data/ion-3.2.1+dfsg/bp/ipn/ipnfw.c:29:2:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vprintf(text, args);
data/ion-3.2.1+dfsg/bp/library/acs/acsP.h:204:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(acsLogBuf, sizeof(acsLogBuf), args);                   \
data/ion-3.2.1+dfsg/bp/library/acs/acstx.c:80:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
              sprintf( text, "ION parms pathname : %s", pathname );
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2060:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(metaEid->nss, UVAST_FIELDSPEC ".%u", &(metaEid->nodeNbr),
data/ion-3.2.1+dfsg/bp/test/bpchat.c:154:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, usage);
data/ion-3.2.1+dfsg/bp/test/bping.c:417:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				fprintf(stderr, usage);
data/ion-3.2.1+dfsg/bp/test/bping.c:442:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, usage);
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:233:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, usage);
data/ion-3.2.1+dfsg/bp/utils/acslist.c:21:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(acslistBuf, sizeof(acslistBuf), args);			\
data/ion-3.2.1+dfsg/bp/utils/acslist.c:26:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(args);											\
data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:164:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, cgr_tracepoint_text(traceType), args);
data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:547:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(f,
data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:597:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		ret = system("dot -Tsvg '" GRAPHVIZ_FILENAME "' | base64 -w 0 "
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1576:6:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    	vfprintf(stderr, fmt, args);
data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:84:6:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if (system("rm dirlist_* >/dev/null 2>/dev/null")<0)
data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:191:6:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    	vfprintf(stderr, fmt, args);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_api.c:31:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (system(find_dtnd) == 0)
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_api.c:33:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		else if (system(find_ion) == 0)
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:77:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(eidString, "%s:%lu",
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:79:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(eidString, "%s.%lu",
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:97:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(eidString,"%s://%s.dtn%s",DTN2SCHEMENAME,hostname,service_tag);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:114:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(eidString, "%s:%lu",
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:116:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(eidString, "%s.%lu",
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:135:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(eidString,"%s://%s.dtn%s",DTN2SCHEMENAME,hostname,service_tag);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:335:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tmp_eid,dlv.bundleSourceEid);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:355:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(filename,"/tmp/ion%s_%u_%u",tmp,
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:288:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(payload.filename.filename_val,filename);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:31:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s;", eid.uri);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:70:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(buf1, buf2);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:76:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(buf1, buf2);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:82:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(buf1, buf2);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:88:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(buf1, buf2);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:94:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(buf1, buf2);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:106:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(buf1, al_bp_status_report_reason_to_str(status_report.reason));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:130:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(buf, string);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:189:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(client_demux_string, "%s_%d", CLI_EP_STRING, getpid());
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:194:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(perf_opt->dest_eid, SERV_EP_STRING);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:242:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(temp,local_eid.uri);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:244:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp,"%s.%s",ptr,MON_EP_NUM_SERVICE);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:252:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(perf_opt->mon_eid, MON_EP_STRING);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:285:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(temp1, "%s_%d", mon_eid.uri, mon_params.client_id);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:287:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(temp1, "%s", mon_eid.uri);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:302:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(mon_eid.uri, temp1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:477:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(temp1, perf_opt->F_arg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:478:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(temp2, basename(temp1));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:480:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(transfer_filename, temp2);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:828:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(source_file, "%s_%d_%d", SOURCE_FILE, getpid(),num_bundle);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:830:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(source_file, "%s_%d", SOURCE_FILE, getpid());
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1028:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(source_file, "%s_%d_%d", SOURCE_FILE, getpid(),sent_bundles);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1035:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(file_bundle_names[sent_bundles], bundle.payload->filename.filename_val);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:102:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(command, "mkdir -p %s", perf_opt->logs_dir);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:109:6:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if (system(command) < 0)
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:145:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, "%s_%d", MON_EP_STRING, parameters->client_id);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:147:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, "%s", MON_EP_STRING);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:416:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
					strcat(filename, strtok(NULL, "\0"));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:422:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
					strcat(filename, strtok(NULL, "/"));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:430:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(full_filename, "%s/%s", perf_opt->logs_dir, filename);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:831:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(cmd, "%s %s", argv[0], MONITOR_STRING);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:148:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(command, "mkdir -p %s", perf_opt->dest_dir);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:155:6:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if (system(command) < 0)
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:169:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(command, "mkdir -p %s", perf_opt->file_dir);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:176:6:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if (system(command) < 0)
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:680:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(tmp_eid,bundle_source_addr.uri);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:693:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(filename_ack,"%s_%s_%d",SOURCE_FILE_ACK,tmp,num_ack);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:895:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(filename, item->info->full_dir);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:896:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(filename, item->info->filename);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1092:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(cmd, "%s %s", argv[0], SERVER_STRING);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1149:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(filename, item->info->full_dir);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1150:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(filename, item->info->filename);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:186:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(filename, info->full_dir);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:187:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(filename, info->filename);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:283:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(full_dir, "%s%s/", dir, eid);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:284:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, "mkdir -p %s", full_dir);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:285:6:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if(system(temp)<0){
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:290:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(full_dir, temp);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:308:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp, s);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:353:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(buffer, home);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:354:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buffer, dir + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:377:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(cmd_args, strchr(cmd, ' '));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:378:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(cmd_exe, get_exe_name(strtok(cmd, " ")));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:401:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cmdline_file, "/proc/%s/cmdline", item->d_name);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:436:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(cmdline_args, cmdline_args_ptr != NULL ? cmdline_args_ptr : "");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:437:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(cmdline_exe, get_exe_name(strtok(cmdline, " ")));
data/ion-3.2.1+dfsg/ici/library/ion.c:480:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		if (sscanf(lineBuf, UVAST_FIELDSPEC " %d %31s %255s",
data/ion-3.2.1+dfsg/ici/library/ion.c:1400:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	count = sscanf(timestampBuffer, timestampInFormat, &ts.tm_year,
data/ion-3.2.1+dfsg/ici/library/platform.c:505:9:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
	return cuserid(buffer);
data/ion-3.2.1+dfsg/ici/library/platform.c:2666:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				sprintf(buffer + stringLength, fmt, sval);
data/ion-3.2.1+dfsg/ici/library/platform.c:2688:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				sprintf(scratchpad, fmt, llval);
data/ion-3.2.1+dfsg/ici/library/platform.c:2693:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				sprintf(scratchpad, fmt, ival);
data/ion-3.2.1+dfsg/ici/library/platform.c:2704:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(scratchpad, fmt, dval);
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:3090:3:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execlp(name, name, arg1, arg2, arg3, arg4, arg5, arg6,
data/ion-3.2.1+dfsg/nm/agent/ingest.c:482:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ctrl->desc.sender.name, meta->senderEid.name);
data/ion-3.2.1+dfsg/nm/agent/ingest.c:558:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(new_rule->desc.sender.name, meta->senderEid.name);
data/ion-3.2.1+dfsg/nm/agent/nmagent.c:942:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) manager_eid.name, argv[2]);
data/ion-3.2.1+dfsg/nm/agent/nmagent.c:943:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) agent_eid.name, argv[1]);
data/ion-3.2.1+dfsg/nm/agent/rda.c:155:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    	strcpy(rx.name,recipient);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr.c:587:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) manager_eid.name, argv[1]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:74:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(query, "INSERT INTO dbtRegisteredAgents(AgentId) "
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:149:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(query,
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:178:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(query,
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:835:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(query,
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1662:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(query,"INSERT INTO dbtIncomingMessages(IncomingID,Content)"
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:291:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(line,"%d %s", &offset, mid_str);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:359:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(line,"%ld %d %d %s", &offset, &period, &evals, mid_str);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:428:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(line,"%ld %d %d %s", &offset, &period, &evals, mid_str);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:503:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(line,"%s", mid_str);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:571:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(line,"%s", mid_str);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:651:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    	sscanf(line,"%s", mid_str);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:696:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(line, "%s", agent_eid.name);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:989:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(result,"%s", (char*) buffer);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1069:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		cursor += sprintf(cursor, "%s, ",buf_ptr);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:220:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(temp, 256,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:236:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(temp, 256,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:246:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(temp, 256,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:258:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(temp, 256,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:268:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(temp, 256,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:283:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(temp, 256,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:295:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(temp, 256,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:323:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(temp, 256,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:371:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:380:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(result,temp);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:150:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cursor, "inducts: %s\noutducts: %s\n",inducts, outducts);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:216:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(result,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:254:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(result,
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:872:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		cursor += sprintf(cursor,UVAST_FIELDSPEC"\n",mid->issuer);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:879:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	cursor += sprintf(cursor,"OID : %s", oid_str);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:884:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		cursor += sprintf(cursor,UVAST_FIELDSPEC"\n",mid->tag);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:891:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	cursor += sprintf(cursor,"RAW : %s", raw_str);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1460:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		cursor += sprintf(cursor,"%s\n",mid_strs[i]);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1580:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		cursor += sprintf(cursor,"%s ",mid_strs[i]);
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:964:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		cursor += sprintf(cursor, "Parm %d:%s\n",i,str);
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:970:12:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	cursor += printf(cursor, "value_size: %d\n", oid->value_size);
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:973:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	cursor += sprintf(cursor, "value: %s\n---------------------\n\n", str);
data/ion-3.2.1+dfsg/nm/shared/utils/ion_if.c:263:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(meta->senderEid.name, dlv.bundleSourceEid);
data/ion-3.2.1+dfsg/nm/shared/utils/ion_if.c:264:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(meta->originatorEid.name, dlv.bundleSourceEid);
data/ion-3.2.1+dfsg/nm/shared/utils/ion_if.c:265:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(meta->recipientEid.name, iif->local_eid.name);
data/ion-3.2.1+dfsg/tests/library/check.c:27:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, msg, ap);
data/ion-3.2.1+dfsg/bp/tcp/stcpcli.c:368:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	tcpDelayString = getenv("TCP_DELAY_NSEC_PER_BYTE");
data/ion-3.2.1+dfsg/bp/tcp/tcpcli.c:569:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	tcpDelayString = getenv("TCP_DELAY_NSEC_PER_BYTE");
data/ion-3.2.1+dfsg/bp/test/bpdriver.c:145:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand((unsigned int) time(NULL));
data/ion-3.2.1+dfsg/bp/test/bping.c:408:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt(argc, argv, "+c:i:hp:q:r:s:t:v")) != EOF) {
data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:827:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt(argc, argv, "hqjt:e:s:mo:p:n:")) >= 0)
data/ion-3.2.1+dfsg/bp/utils/hmackeys.c:67:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:499:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:834:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/ion-3.2.1+dfsg/bssp/tcp/tcpbsi.c:404:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	tcpDelayString = getenv("TCP_DELAY_NSEC_PER_BYTE");
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:359:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		corruptionModulusString = getenv("CFDP_CORRUPTION_MODULUS");
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:167:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt(argc, argv, "dqrL:C:S:v")) != -1)
data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:45:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt(argc, argv, "dv")) != -1)
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1600:7:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		c = getopt_long(argc, argv, "hvMCW:d:m:i:T:D:F:P:l:R:p:NrfL::", long_options, &option_index);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:740:8:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
			c = getopt_long(argc, argv, "hvao:s", long_options, &option_index);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:969:7:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		c = getopt_long(argc, argv, "hvMl:p:ao:s", long_options, &option_index);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:352:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		char * home = getenv("HOME");
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:144:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand((unsigned int) time(NULL));
data/ion-3.2.1+dfsg/ici/library/ion.c:402:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	nodeListDir = getenv("ION_NODE_LIST_DIR");
data/ion-3.2.1+dfsg/ici/library/ion.c:1074:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	wdname = getenv("ION_NODE_WDNAME");
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2847:6:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (CreateProcess(NULL, cmdLine, NULL, NULL, FALSE, 0, NULL, NULL,
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2847:6:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (CreateProcess(NULL, cmdLine, NULL, NULL, FALSE, 0, NULL, NULL,
data/ion-3.2.1+dfsg/ici/test/owltsim.c:332:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/ion-3.2.1+dfsg/ici/test/smrbtsh.c:155:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			srand(seed);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:520:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL) * sm_TaskIdSelf());
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:827:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL) * sm_TaskIdSelf());
data/ion-3.2.1+dfsg/tests/library/paths.c:14:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char * cfgroot = getenv("CONFIGSROOT");
data/ion-3.2.1+dfsg/ams/library/amscommon.c:514:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mib->csPublicKeyName, pubkeyname, length);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:522:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mib->csPrivateKeyName, privkeyname, length);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1157:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(subj->symmetricKeyName, symmetricKeyName, length);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1165:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(subj->marshalFnName, marshalFnName, length);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1173:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(subj->unmarshalFnName, unmarshalFnName, length);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1214:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(role->publicKeyName, publicKeyName, length);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1222:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(role->privateKeyName, privateKeyName, length);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1381:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(app->publicKeyName, publicKeyName, length);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1389:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(app->privateKeyName, privateKeyName, length);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1406:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		gwEidBuffer[MAX_GW_EID + 1];
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1437:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msgspace->symmetricKeyName, symmetricKeyName, length);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1655:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		gwEidBuffer[MAX_GW_EID + 1];
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1827:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		endpointName[MAX_EP_NAME + 1];
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1908:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) amsesPtr, &amses, sizeof(AmsEpspec));
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1985:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(endpoint->ept, ept, eptLength);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2059:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		authKey[32];
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2063:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	authenticator[AUTHENTICAT_LEN];
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2068:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	timeTag[5];
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2101:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(authenticator, (char *) &nonce, 4);/*	Clear.	*/
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(authenticator + 4, (char *) &nonce, 4);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2128:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(timeTag + 1, (char *) &u4, 4);	/*	Coarse time.	*/
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2149:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg + 2, (char *) &u2, 2);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2154:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg + 6, (char *) &u2, 2);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2156:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg + 8, (char *) &u4, 4);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2157:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg + 12, timeTag, 5);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2163:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msg + 17, authenticator, authenticatorLength);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2170:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msg + 17 + authenticatorLength, supplement,
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2179:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg + (msgLength -2), (char *) &checksum, 2);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2280:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		authKey[32];
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2283:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	nonce[4];
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2346:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &checksum, msgBuffer + (length - 2), 2);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2359:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &u2, msgBuffer + 2, 2);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2371:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &u2, msgBuffer + 6, 2);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2409:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nonce, authenticator, 4);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2424:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &u4, msgBuffer + 8, 4);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2431:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msg.supplement, supplement, msg.supplementLength);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2441:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(evt->value, (char *) &msg, sizeof(MamsMsg));
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2476:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(evt->value, text, textLength);
data/ion-3.2.1+dfsg/ams/library/amscommon.h:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		value[1];
data/ion-3.2.1+dfsg/ams/library/amscommon.h:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		epspec[MAX_EP_SPEC + 1];
data/ion-3.2.1+dfsg/ams/library/amsd.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		undeclaredModules[MAX_MODULE_NBR + 1];
data/ion-3.2.1+dfsg/ams/library/amsd.c:767:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(evt->value, (char *) &msg, sizeof msg);
data/ion-3.2.1+dfsg/ams/library/amsd.c:862:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	moduleLyst[MAX_MODULE_NBR + 1];
data/ion-3.2.1+dfsg/ams/library/amsd.c:1788:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ventureName[MAX_APP_NAME + 2 + MAX_AUTH_NAME + 1];
data/ion-3.2.1+dfsg/ams/library/amsd.c:2038:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ownHostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ams/library/amsd.c:2039:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		eps[MAXHOSTNAMELEN + 5 + 1];
data/ion-3.2.1+dfsg/ams/library/crypt.c:22:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cyphertext, plaintext, ptlen);
data/ion-3.2.1+dfsg/ams/library/crypt.c:35:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, cyphertext, ctlen);
data/ion-3.2.1+dfsg/ams/library/crypt.c:48:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cyphertext, plaintext, ptlen);
data/ion-3.2.1+dfsg/ams/library/crypt.c:61:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, cyphertext, ctlen);
data/ion-3.2.1+dfsg/ams/library/crypt.c:93:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*plaintext, cyphertext, ctlen);
data/ion-3.2.1+dfsg/ams/library/default.crypt.c:22:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cyphertext, plaintext, ptlen);
data/ion-3.2.1+dfsg/ams/library/default.crypt.c:35:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, cyphertext, ctlen);
data/ion-3.2.1+dfsg/ams/library/default.crypt.c:48:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cyphertext, plaintext, ptlen);
data/ion-3.2.1+dfsg/ams/library/default.crypt.c:61:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, cyphertext, ctlen);
data/ion-3.2.1+dfsg/ams/library/default.crypt.c:93:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*plaintext, cyphertext, ctlen);
data/ion-3.2.1+dfsg/ams/library/dgrts.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		endpointNameText[32];
data/ion-3.2.1+dfsg/ams/library/dgrts.c:164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		endpointNameText[32];
data/ion-3.2.1+dfsg/ams/library/dgrts.c:283:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) (ep->tsep), (char *) &tsep, sizeof(DgrTsep));
data/ion-3.2.1+dfsg/ams/library/dgrts.c:313:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) (dp->tsep), (char *) &tsep, sizeof(DgrTsep));
data/ion-3.2.1+dfsg/ams/library/dgrts.c:415:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dgrAmsBuf, header, headerLen);
data/ion-3.2.1+dfsg/ams/library/dgrts.c:418:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dgrAmsBuf + headerLen, content, contentLen);
data/ion-3.2.1+dfsg/ams/library/dgrts.c:424:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dgrAmsBuf + headerLen + contentLen, (char *) &checksum, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:199:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(evt->value, text, textLength);
data/ion-3.2.1+dfsg/ams/library/libams.c:517:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &checksum, msgBuffer + (length - 2), 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:565:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		keyBuffer[512];
data/ion-3.2.1+dfsg/ams/library/libams.c:585:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newContent, msg->content, msg->contentLength);
data/ion-3.2.1+dfsg/ams/library/libams.c:649:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fileName[MAXPATHLEN];
data/ion-3.2.1+dfsg/ams/library/libams.c:743:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &msg.subjectNbr, msgBuffer + 12, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:849:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &msg.contextNbr, msgBuffer + 8, 4);
data/ion-3.2.1+dfsg/ams/library/libams.c:888:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(evt->value, (char *) &msg, sizeof(AmsMsg));
data/ion-3.2.1+dfsg/ams/library/libams.c:927:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		keyBuffer[512];
data/ion-3.2.1+dfsg/ams/library/libams.c:948:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header + 8, (char *) &context, 4);
data/ion-3.2.1+dfsg/ams/library/libams.c:950:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header + 12, (char *) &i2, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:1002:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newContent, *content, *contentLength);
data/ion-3.2.1+dfsg/ams/library/libams.c:1061:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(evt->value, (char *) &msg, sizeof msg);
data/ion-3.2.1+dfsg/ams/library/libams.c:1092:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*cursor, (char *) &subjectNbr, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:1098:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*cursor, (char *) &unitNbr, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:1118:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, (char *) &i2, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:1133:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, (char *) &i2, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:1211:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cursor, tsif->ts->name, len);
data/ion-3.2.1+dfsg/ams/library/libams.c:1216:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cursor, tsif->ept, len);
data/ion-3.2.1+dfsg/ams/library/libams.c:1255:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(supplement, (char *) &moduleStatesCount, 4);
data/ion-3.2.1+dfsg/ams/library/libams.c:1499:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(evt->value, (char *) &notice, sizeof notice);
data/ion-3.2.1+dfsg/ams/library/libams.c:1828:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &i2, *cursor, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:1839:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &u2, *cursor, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:1939:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &u2, cursor, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:1965:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &u2, cursor, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:2119:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ep->ept, ept, eptLength);
data/ion-3.2.1+dfsg/ams/library/libams.c:2452:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &u4, msg->supplement, 4);
data/ion-3.2.1+dfsg/ams/library/libams.c:2465:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) &u2, cursor, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:2560:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &i2, msg->supplement, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:2565:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &u2, msg->supplement + 4, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:2692:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &u4, msg->supplement, 4);
data/ion-3.2.1+dfsg/ams/library/libams.c:2705:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) &u2, cursor, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:2796:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &i2, msg->supplement, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:2801:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &u2, msg->supplement + 4, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:3028:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	modules[MAX_MODULE_NBR];
data/ion-3.2.1+dfsg/ams/library/libams.c:3076:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, modules, moduleCount);
data/ion-3.2.1+dfsg/ams/library/libams.c:3680:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ventureName[MAX_APP_NAME + 2 + MAX_AUTH_NAME + 1];
data/ion-3.2.1+dfsg/ams/library/libams.c:4477:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		amsHeader[16];
data/ion-3.2.1+dfsg/ams/library/libams.c:4842:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cancellation, (char *) &i2, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:4847:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cancellation + 4, (char *) &u2, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:4898:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(envelope + 8, (unsigned char *) &i2, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:4904:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(envelope + 12, enclosureHdr, enclosureHdrLength);
data/ion-3.2.1+dfsg/ams/library/libams.c:4905:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(envelope + 12 + enclosureHdrLength, enclosureContent,
data/ion-3.2.1+dfsg/ams/library/libams.c:5034:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cancellation, (char *) &i2, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:5040:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cancellation + 4, (char *) &u2, 2);
data/ion-3.2.1+dfsg/ams/library/libams.c:5105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		amsHeader[16];
data/ion-3.2.1+dfsg/ams/library/libams.c:5771:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		amsHeader[16];
data/ion-3.2.1+dfsg/ams/library/libams.c:6005:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, (char *) &code, sizeof(int));
data/ion-3.2.1+dfsg/ams/library/libams.c:6007:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, (char *) &dataLength, sizeof(int));
data/ion-3.2.1+dfsg/ams/library/libams.c:6011:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, data, dataLength);
data/ion-3.2.1+dfsg/ams/library/libams.c:6370:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) code, event->value, sizeof(int));
data/ion-3.2.1+dfsg/ams/library/libams.c:6371:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) dataLength, event->value + sizeof(int), sizeof(int));
data/ion-3.2.1+dfsg/ams/library/libams.c:6423:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(sap->eventMgtRules), rules, sizeof(AmsEventMgt));
data/ion-3.2.1+dfsg/ams/library/loadmib.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ownHostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ams/library/loadmib.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			eps[MAXHOSTNAMELEN + 5 + 1];
data/ion-3.2.1+dfsg/ams/library/loadmib.c:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[256];
data/ion-3.2.1+dfsg/ams/library/loadmib.c:208:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			cnbr = atoi(value);
data/ion-3.2.1+dfsg/ams/library/loadmib.c:267:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			contnbr = atoi(value);
data/ion-3.2.1+dfsg/ams/library/loadmib.c:275:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			isNeighbor = 1 - (0 == atoi(value));
data/ion-3.2.1+dfsg/ams/library/loadmib.c:357:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			after = atoi(value);
data/ion-3.2.1+dfsg/ams/library/loadmib.c:571:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			vnbr = atoi(value);
data/ion-3.2.1+dfsg/ams/library/loadmib.c:598:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rzrsp = atoi(value);
data/ion-3.2.1+dfsg/ams/library/loadmib.c:671:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rolenbr = atoi(value);
data/ion-3.2.1+dfsg/ams/library/loadmib.c:761:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subjnbr = atoi(value);
data/ion-3.2.1+dfsg/ams/library/loadmib.c:957:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			znbr = atoi(value);
data/ion-3.2.1+dfsg/ams/library/loadmib.c:965:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rsp = atoi(value);
data/ion-3.2.1+dfsg/ams/library/loadmib.c:1040:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			contnbr = atoi(value);
data/ion-3.2.1+dfsg/ams/library/loadmib.c:1398:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*atts[MAX_ATTRIBUTES * 2];
data/ion-3.2.1+dfsg/ams/library/loadmib.c:1492:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[256];
data/ion-3.2.1+dfsg/ams/library/loadmib.c:1551:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[256];
data/ion-3.2.1+dfsg/ams/library/tcpts.c:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			endpointNameText[32];
data/ion-3.2.1+dfsg/ams/library/tcpts.c:558:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) (dp->tsep), (char *) &tsep, sizeof(TcpTsep));
data/ion-3.2.1+dfsg/ams/library/tcpts.c:688:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tcpAmsBuf, header, headerLen);
data/ion-3.2.1+dfsg/ams/library/tcpts.c:691:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tcpAmsBuf + headerLen, content, contentLen);
data/ion-3.2.1+dfsg/ams/library/tcpts.c:697:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tcpAmsBuf + headerLen + contentLen, (char *) &checksum, 2);
data/ion-3.2.1+dfsg/ams/library/udpts.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		hostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ams/library/udpts.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			hostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ams/library/udpts.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			endpointNameText[32];
data/ion-3.2.1+dfsg/ams/library/udpts.c:91:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/ams/library/udpts.c:111:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &ipAddress, (char *) &(inetName->sin_addr.s_addr), 4);
data/ion-3.2.1+dfsg/ams/library/udpts.c:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			hostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ams/library/udpts.c:195:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			endpointNameText[32];
data/ion-3.2.1+dfsg/ams/library/udpts.c:231:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/ams/library/udpts.c:251:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &ipAddress, (char *) &(inetName->sin_addr.s_addr), 4);
data/ion-3.2.1+dfsg/ams/library/udpts.c:329:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	hostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ams/library/udpts.c:338:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	tsep.portNbr = atoi(colon + 1);
data/ion-3.2.1+dfsg/ams/library/udpts.c:342:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) (ep->tsep), (char *) &tsep, sizeof(UdpTsep));
data/ion-3.2.1+dfsg/ams/library/udpts.c:362:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	hostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ams/library/udpts.c:371:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	tsep.portNbr = atoi(colon + 1);
data/ion-3.2.1+dfsg/ams/library/udpts.c:375:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) (dp->tsep), (char *) &tsep, sizeof(UdpTsep));
data/ion-3.2.1+dfsg/ams/library/udpts.c:423:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/ams/library/udpts.c:499:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/ams/library/udpts.c:502:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(udpAmsBuf, header, headerLen);
data/ion-3.2.1+dfsg/ams/library/udpts.c:505:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(udpAmsBuf + headerLen, content, contentLen);
data/ion-3.2.1+dfsg/ams/library/udpts.c:511:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(udpAmsBuf + headerLen + contentLen, (char *) &checksum, 2);
data/ion-3.2.1+dfsg/ams/library/vmqts.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		endpointNameText[32];
data/ion-3.2.1+dfsg/ams/library/vmqts.c:157:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) (dp->tsep), (char *) &tsep, sizeof(VmqTsep));
data/ion-3.2.1+dfsg/ams/library/vmqts.c:203:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(vmqAmsBuf, header, headerLen);
data/ion-3.2.1+dfsg/ams/library/vmqts.c:206:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(vmqAmsBuf + headerLen, content, contentLen);
data/ion-3.2.1+dfsg/ams/library/vmqts.c:212:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(vmqAmsBuf + headerLen + contentLen, (char *) &checksum, 2);
data/ion-3.2.1+dfsg/ams/library/vmqts.c:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ownHostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ams/library/vmqts.c:241:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	vmqName[32];
data/ion-3.2.1+dfsg/ams/rams/librams.c:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[512];
data/ion-3.2.1+dfsg/ams/rams/librams.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		gwEid[256];
data/ion-3.2.1+dfsg/ams/rams/librams.c:429:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		gwEidBuffer[32];
data/ion-3.2.1+dfsg/ams/rams/librams.c:435:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &ipAddress, (char *) &(inetName->sin_addr.s_addr), 4);
data/ion-3.2.1+dfsg/ams/rams/librams.c:535:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		envelope[ENVELOPELENGTH];
data/ion-3.2.1+dfsg/ams/rams/librams.c:537:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			gwEid[256];
data/ion-3.2.1+dfsg/ams/rams/librams.c:759:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &(inetName->sin_addr.s_addr),
data/ion-3.2.1+dfsg/ams/rams/librams.c:1073:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[256];
data/ion-3.2.1+dfsg/ams/rams/librams.c:1132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[256];
data/ion-3.2.1+dfsg/ams/rams/librams.c:1421:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		petitionLine[512];
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:56:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(envelope + 8, (unsigned char *) &i2, 2);
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:62:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(envelope + 12, enclosure, enclosureLength);
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:92:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) & subj, enc + 12, 2);
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:140:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &subj, envl + 8, 2);
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:266:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header + 8, (char *) &context, 4);
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:269:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header + 12, (char *) &i2, 2);
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:275:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(enc->text + AMSMSGHEADER, content, contentLength);
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pet->specification->envelope, envelope,
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:985:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		errorMsg[128];
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:1029:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			gwEid[256];
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:1034:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			errorMsg[128];
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:1045:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:1082:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rpdu->envelope, envelope, envelopeLength);
data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:1093:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		errorMsg[128];
data/ion-3.2.1+dfsg/ams/test/amsbenchr.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[128];
data/ion-3.2.1+dfsg/ams/test/amsbenchr.c:75:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) &msgNbr, txt, sizeof(int));
data/ion-3.2.1+dfsg/ams/test/amsbenchs.c:33:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int		count = (argc > 1 ? atoi(argv[1]) : 0);
data/ion-3.2.1+dfsg/ams/test/amsbenchs.c:34:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int		size = (argc > 2 ? atoi(argv[2]) : 0);
data/ion-3.2.1+dfsg/ams/test/amsbenchs.c:88:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buffer, (char *) &content, sizeof(int));
data/ion-3.2.1+dfsg/ams/test/amshello.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[80];
data/ion-3.2.1+dfsg/ams/test/amslog.c:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	replyText[256];
data/ion-3.2.1+dfsg/ams/test/amslog.c:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[256];
data/ion-3.2.1+dfsg/ams/test/amslog.c:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		subjectName[33];
data/ion-3.2.1+dfsg/ams/test/amslog.c:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		unitName[33];
data/ion-3.2.1+dfsg/ams/test/amslog.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		roleName[33];
data/ion-3.2.1+dfsg/ams/test/amslog.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		continName[33];			// CW, 5/1/06
data/ion-3.2.1+dfsg/ams/test/amslogprt.c:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		subjectName[33];
data/ion-3.2.1+dfsg/ams/test/amslogprt.c:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		text[8];
data/ion-3.2.1+dfsg/ams/test/amslogprt.c:63:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(text, (char *) &contentLength,
data/ion-3.2.1+dfsg/ams/test/amspubsub.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[256];
data/ion-3.2.1+dfsg/ams/test/amsshell.c:83:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	subjectName[MAX_SUBJ_NAME + 1] = "";
data/ion-3.2.1+dfsg/ams/test/amsshell.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256];
data/ion-3.2.1+dfsg/ams/utils/amsmib.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	content[MAX_MIB_UPDATE_TEXT];
data/ion-3.2.1+dfsg/arch-android/iondtn/jni/gdslogger.c:4:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	timestampBuffer[20];
data/ion-3.2.1+dfsg/arch-android/iondtn/jni/gdslogger.c:5:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	msgbuf[256];
data/ion-3.2.1+dfsg/arch-android/iondtn/jni/iondtn.c:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	filenamebuf[80];
data/ion-3.2.1+dfsg/arch-android/iondtn/jni/iondtn.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	linebuf[255];
data/ion-3.2.1+dfsg/arch-android/iondtn/jni/iondtn.c:220:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmd[80];
data/ion-3.2.1+dfsg/arch-rtems/gdslogger.c:4:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	timestampBuffer[20];
data/ion-3.2.1+dfsg/arch-rtems/gdslogger.c:5:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	msgbuf[256];
data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	filenamebuf[80];
data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	linebuf[255];
data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmd[80];
data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:314:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmd[80];
data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:395:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:398:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buffer, "[i] Delta from UTC revised, is now %d.", delta);
data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:405:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:407:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buffer, "[i] Delta from UTC is %d.", ionvdb->deltaFromUTC);
data/ion-3.2.1+dfsg/arch-rtems/pmqlsi.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			msgbuf[PMQLSA_MSGSIZE];
data/ion-3.2.1+dfsg/bp/brs/brsccla.c:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			keyName[32];
data/ion-3.2.1+dfsg/bp/brs/brsccla.c:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			key[DIGEST_LEN];
data/ion-3.2.1+dfsg/bp/brs/brsccla.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			hostName[16];
data/ion-3.2.1+dfsg/bp/brs/brsccla.c:222:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			registration[REGISTRATION_LEN];
data/ion-3.2.1+dfsg/bp/brs/brsccla.c:223:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			expectedCountersign[DIGEST_LEN];
data/ion-3.2.1+dfsg/bp/brs/brsccla.c:224:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			receivedCountersign[DIGEST_LEN];
data/ion-3.2.1+dfsg/bp/brs/brsccla.c:234:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			destDuctName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/brs/brsccla.c:254:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ductNbr = atoi(ductNbrString);
data/ion-3.2.1+dfsg/bp/brs/brsccla.c:354:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/bp/brs/brsccla.c:376:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(registration, (char *) &timeTag, 4);
data/ion-3.2.1+dfsg/bp/brs/brsccla.c:468:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			destDuctName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:100:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ductNbr = atoi(destDuctName);
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:278:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		sdnvText[10];
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:283:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			registration[24];
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:285:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			keyName[32];
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:286:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			key[DIGEST_LEN];
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:289:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			errtext[300];
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:290:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			digest[DIGEST_LEN];
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:385:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &timeTag, registration, 4);
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:418:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(registration + 4, digest, DIGEST_LEN);
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:739:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(atp.inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:800:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:855:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	baseDuctNbr = a2 ? atoi((char *) a2) : 1;
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:856:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	lastDuctNbr = a3 ? atoi((char *) a3) : baseDuctNbr + 255;
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:861:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	baseDuctNbr = argc > 2 ? atoi(argv[2]) : 1;
data/ion-3.2.1+dfsg/bp/brs/brsscla.c:862:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	lastDuctNbr = argc > 3 ? atoi(argv[3]) : baseDuctNbr + 255;
data/ion-3.2.1+dfsg/bp/bssp/bsspclo.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		destDuctName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/cgr/libcgr.c:1150:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(proxNode->directive), (char *) &directive,
data/ion-3.2.1+dfsg/bp/cgr/libcgr.c:1378:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		stationEid[64];
data/ion-3.2.1+dfsg/bp/dccp/dccpcli.c:305:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&rp->fromAddr, &fromAddr, sizeof(struct sockaddr));
data/ion-3.2.1+dfsg/bp/dccp/dccpcli.c:429:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/bp/dccp/dccpclo.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		keepalive[4];
data/ion-3.2.1+dfsg/bp/dccp/dccpclo.c:379:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				destDuctName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/dccp/dccpclo.c:469:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/bp/dgr/dgrcla.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			destDuctName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/dgr/dgrcla.c:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			hostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	eidString[SDRSTRING_BUFSZ + 1];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	destDuctName[SDRSTRING_BUFSZ + 1];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[1024];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:390:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	nameBuf[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	toNodeName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:437:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	demux[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:438:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	context[128];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:627:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*tokens[9];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:628:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:719:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[256];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2adminep.c:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	memobuf[1024];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2adminep.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	memobuf[1024];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		eidString[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nodeName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		demux[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:146:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(outputNodeName, inputNodeName, nameLength);
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	stringBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:299:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) dirbuf, (char *) &plan->defaultDirective,
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:306:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) dirbuf, (char *) &rule->directive,
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:316:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	nameBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:351:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	nodeName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:378:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nodeName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:400:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &plan.defaultDirective, (char *) defaultDir,
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:431:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nodeName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:456:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &plan.defaultDirective, (char *) defaultDir,
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:471:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	nodeName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:521:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	nameBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:558:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	nodeName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:606:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nodeName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:646:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &ruleBuf.directive, (char *) directive,
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:675:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nodeName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:715:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &ruleBuf.directive, (char *) directive,
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:730:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	nodeName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:88:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	imc_addKin(strtouvast(tokens[1]), atoi(tokens[2]));
data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:99:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	imc_updateKin(strtouvast(tokens[1]), atoi(tokens[2]));
data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[32];
data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:196:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*tokens[9];
data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:281:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[256];
data/ion-3.2.1+dfsg/bp/imc/imcfw.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nss[64];
data/ion-3.2.1+dfsg/bp/imc/imcfw.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		stationEid[64];
data/ion-3.2.1+dfsg/bp/imc/libimcfw.c:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sourceEid[32];
data/ion-3.2.1+dfsg/bp/imc/libimcfw.c:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		destEid[32];
data/ion-3.2.1+dfsg/bp/imc/libimcfw.c:173:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, groupNbrSdnv.text, groupNbrSdnv.length);
data/ion-3.2.1+dfsg/bp/imc/libimcfw.c:385:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, groupNbrSdnv.text, groupNbrSdnv.length);
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:481:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	string[SDRSTRING_BUFSZ + 1];
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:482:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[1024];
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:528:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	context[32];
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:566:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	sourceServiceString[21];
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:567:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	sourceNodeString[21];
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:568:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	context[80];
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:660:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	eidString[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:661:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[384];
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:979:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*tokens[9];
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:980:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:1071:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[256];
data/ion-3.2.1+dfsg/bp/ipn/ipnadminep.c:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		memobuf[1024];
data/ion-3.2.1+dfsg/bp/ipn/ipnadminep.c:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	memobuf[1024];
data/ion-3.2.1+dfsg/bp/ipn/ipnfw.c:103:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) directive, (char *) &plan.defaultDirective,
data/ion-3.2.1+dfsg/bp/ipn/ipnfw.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		stationEid[64];
data/ion-3.2.1+dfsg/bp/ipn/ipnfw.c:205:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		eidString[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c:645:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) dirbuf, (char *) &rule->directive,
data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c:700:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) dirbuf, (char *) &plan->defaultDirective,
data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c:1162:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) dirbuf, (char *) &group.defaultDirective,
data/ion-3.2.1+dfsg/bp/library/acs/acsP.h:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 			eid[MAX_EID_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/acs/acsP.h:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                sourceEid[MAX_EID_LEN];
data/ion-3.2.1+dfsg/bp/library/acs/acsP.h:203:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char acsLogBuf[MAX_ACSLOG_LEN];                                 \
data/ion-3.2.1+dfsg/bp/library/acs/acsappend.c:304:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(cursor, "...");
data/ion-3.2.1+dfsg/bp/library/acs/acsid.c:85:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&cbid.bundleId, &bid, sizeof(bid));
data/ion-3.2.1+dfsg/bp/library/acs/acsid.c:161:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(id, &cbid.bundleId, sizeof(cbid.bundleId));
data/ion-3.2.1+dfsg/bp/library/acs/acsrx.c:69:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(cursor, "...");
data/ion-3.2.1+dfsg/bp/library/acs/acsrx.c:77:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(toReturn, reprAcs, MAX_REPRACS_LEN - reprAcsLeft);
data/ion-3.2.1+dfsg/bp/library/acs/acsrx.c:209:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ctSig.creationTime, &bid.creationTime, sizeof(BpTimestamp));
data/ion-3.2.1+dfsg/bp/library/acs/acsserialize.c:49:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(args->buf + args->iBuf, encoded.text, encoded.length);
data/ion-3.2.1+dfsg/bp/library/acs/acsserialize.c:55:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(args->buf + args->iBuf, encoded.text, encoded.length);
data/ion-3.2.1+dfsg/bp/library/acs/acstx.c:78:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char text[100];
data/ion-3.2.1+dfsg/bp/library/acs/acstx.c:710:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/ion-3.2.1+dfsg/bp/library/bei.c:814:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, blkProcFlagsSdnv.text, blkProcFlagsSdnv.length);
data/ion-3.2.1+dfsg/bp/library/bei.c:818:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, referenceCountSdnv.text,
data/ion-3.2.1+dfsg/bp/library/bei.c:825:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cursor, offsetSdnv.text, offsetSdnv.length);
data/ion-3.2.1+dfsg/bp/library/bei.c:830:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, dataLengthSdnv.text, dataLengthSdnv.length);
data/ion-3.2.1+dfsg/bp/library/bei.c:832:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, blockData, dataLength);
data/ion-3.2.1+dfsg/bp/library/bei.c:897:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(blk->bytes, startOfBlock, blockLength);
data/ion-3.2.1+dfsg/bp/library/bei.c:902:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(blk->bytes + 1, blkProcFlagsSdnv.text, blkProcFlagsSdnv.length);
data/ion-3.2.1+dfsg/bp/library/bei.c:978:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(blk, (char *) blkHdr, blkHdr->size);
data/ion-3.2.1+dfsg/bp/library/bei.h:102:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	bytes[1];	/**	Variable-length array.	*/
data/ion-3.2.1+dfsg/bp/library/bei.h:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[32];	/** Name of extension	*/
data/ion-3.2.1+dfsg/bp/library/bpP.h:410:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nss[MAX_NSS_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/bpP.h:440:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nss[MAX_NSS_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/bpP.h:452:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[MAX_SCHEME_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/bpP.h:468:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[MAX_SCHEME_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/bpP.h:473:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		adminEid[MAX_EID_LEN];
data/ion-3.2.1+dfsg/bp/library/bpP.h:485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/bpP.h:509:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		protocolName[MAX_CL_PROTOCOL_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/bpP.h:510:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ductName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/bpP.h:525:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/bpP.h:556:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		protocolName[MAX_CL_PROTOCOL_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/bpP.h:557:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ductName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/bpP.h:573:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[MAX_CL_PROTOCOL_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/bpP.h:774:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[BP_MAX_BLOCK_SIZE];
data/ion-3.2.1+dfsg/bp/library/bpnm.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nodeID[256];
data/ion-3.2.1+dfsg/bp/library/bpnm.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		bpVersionNbr[16];
data/ion-3.2.1+dfsg/bp/library/bpnm.h:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		eid[BPNM_ENDPOINT_EIDSTRING_LEN];
data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.c:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	dataBuffer[32];
data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.c:27:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dataBuffer, ageSdnv.text, ageSdnv.length);
data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dataBuffer[32];
data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.c:89:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dataBuffer, ageSdnv.text, ageSdnv.length);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cipherKeyName[BSP_KEY_NAME_LEN]; /** Cipherkey name used by this block.*/
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expectedResult[BAB_HMAC_SHA1_RESULT_LEN];
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:706:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(collabBlk.expectedResult, digest, digestLen);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:740:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(asb.resultData + 1, digestSdnv.text, digestSdnv.length);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:741:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(asb.resultData + digestOffset, digest, digestLen);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:956:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(collabBlk.expectedResult, digest, digestLen);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:1002:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&(collabBlk.cipherKeyName), &(secInfo.cipherKeyName),
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.c:390:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) sessionKeyValue, (char *) decryptedData, sessionKeyLen);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.c:613:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(asb.resultData + 1, sessionKeySdnv.text, sessionKeySdnv.length);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.c:614:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(asb.resultData + 1 + sessionKeySdnv.length, encryptedData, sessionKeyLen);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.c:1116:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *)encryptedKey, (char *)sessionKey, sessionKeyLen);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppib.c:641:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(asb.resultData + 1, digestSdnv.text, digestSdnv.length);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppib.c:642:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(asb.resultData + digestOffset, digest, digestLen);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:74:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	gMsg[GMSG_BUFLEN];
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:160:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stream, value->text, value->length);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:286:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((char *)asb->resultData, cursor, asb->resultLen);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:569:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cursor, (char *)asb->resultData, asb->resultLen);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1019:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(srcNode, tmp2, strlen(tmp2));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1023:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(destNode, ctxt->proxNodeEid, strlen(ctxt->proxNodeEid));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1035:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(srcNode, tmp2, strlen(tmp2));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1046:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(srcNode, tmp2, strlen(tmp2));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1058:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(destNode, tmp2, strlen(tmp2));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1077:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp2, srcNode, strlen(srcNode));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1084:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp2, destNode, strlen(destNode));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1155:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                    cwd[200];
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1156:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                    fileName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1192:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                fd = open(fileName, O_WRONLY | O_CREAT, 0666);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1208:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(fileName, O_WRONLY, 0666);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.h:230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cipherKeyName[BSP_KEY_NAME_LEN];
data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:193:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctebBytes + i, custodyIdSdnv.text, custodyIdSdnv.length);
data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:195:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctebBytes + i, custodianEid, custodianEidLen);
data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:237:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(custodianEid, cursor, bytesRemaining);
data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:270:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(blk->object, &cteb, sizeof(CtebScratchpad));
data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:301:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cteb, acqExtBlk->object,
data/ion-3.2.1+dfsg/bp/library/ext/ecos/ecos.c:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	dataBuffer[32];
data/ion-3.2.1+dfsg/bp/library/ext/ecos/ecos.c:43:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dataBuffer + 2, flowLabelSdnv.text, flowLabelSdnv.length);
data/ion-3.2.1+dfsg/bp/library/ext/phn/phn.c:93:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(adminEid, vscheme->adminEid, nameLength);
data/ion-3.2.1+dfsg/bp/library/ext/snid/snid.c:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	dataBuffer[32];
data/ion-3.2.1+dfsg/bp/library/ext/snid/snid.c:26:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dataBuffer, nodeNbrSdnv.text, nodeNbrSdnv.length);
data/ion-3.2.1+dfsg/bp/library/ext/snid/snid.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		uriBuffer[32];
data/ion-3.2.1+dfsg/bp/library/libbp.c:122:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&sap.endpointMetaEid, &metaEid, sizeof(MetaEid));
data/ion-3.2.1+dfsg/bp/library/libbp.c:160:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) *bpsapPtr, (char *) &sap, sizeof(Sap));
data/ion-3.2.1+dfsg/bp/library/libbpP.c:804:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		hostNameBuf[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:811:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		cmdString[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:1011:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmd[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:1012:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmdString[SDRSTRING_BUFSZ + 1 + MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:1145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmd[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:1146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmdString[SDRSTRING_BUFSZ + 1 + MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:1630:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		cmdString[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[600];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmdString[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	parmsString[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[256];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		toTimestamp[20];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2281:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fromTimestamp[20];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2769:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		key[BUNDLES_HASH_KEY_BUFLEN];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:4474:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		bundleKey[BUNDLES_HASH_KEY_BUFLEN];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:4599:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) newBundle, (char *) oldBundle, sizeof(Bundle));
data/ion-3.2.1+dfsg/bp/library/libbpP.c:4755:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		eidBuf[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:4986:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*strings[8];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:5099:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, strings[i], stringLengths[i]);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:5126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sourceEidString[MAX_EID_LEN];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:5776:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nssBuf[42];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:5812:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	scriptBuf[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:6412:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cwd[200];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:6413:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			fileName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:6713:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buf[80];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:6854:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(work->dictionary, cursor, bundle->dictionaryLength);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:7939:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, fragmentOffsetSdnv.text, fragmentOffsetSdnv.length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:7942:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, fragmentLengthSdnv.text, fragmentLengthSdnv.length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:7945:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, signalTimeSecondsSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:7949:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, signalTimeNanosecSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:7953:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, creationTimeSecondsSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:7957:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, creationTimeCountSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:7961:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, eidLengthSdnv.text, eidLengthSdnv.length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:7964:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, csig->sourceEid, eidLength);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8038:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(csig->sourceEid, cursor, eidLength);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8181:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, fragmentOffsetSdnv.text, fragmentOffsetSdnv.length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8184:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, fragmentLengthSdnv.text, fragmentLengthSdnv.length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8187:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, receiptTimeSecondsSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8191:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, receiptTimeNanosecSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8195:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, custodyTimeSecondsSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8199:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, custodyTimeNanosecSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8203:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, forwardTimeSecondsSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8207:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, forwardTimeNanosecSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8211:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, deliveryTimeSecondsSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8215:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, deliveryTimeNanosecSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8219:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, deletionTimeSecondsSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, deletionTimeNanosecSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8227:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, creationTimeSecondsSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8231:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, creationTimeCountSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8235:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, eidLengthSdnv.text, eidLengthSdnv.length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8238:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, rpt->sourceEid, eidLength);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8348:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rpt->sourceEid, cursor, eidLength);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8580:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, bundleProcFlagsSdnv.text, bundleProcFlagsSdnv.length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8583:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, residualBlkLengthSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8589:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, eidSdnvs[i].text, eidSdnvs[i].length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8593:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, creationTimestampTimeSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8597:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, creationTimestampCountSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8601:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, lifetimeSdnv.text, lifetimeSdnv.length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8604:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, dictionaryLengthSdnv.text, dictionaryLengthSdnv.length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8616:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, fragmentOffsetSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8619:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, totalAduLengthSdnv.text,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8657:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, blkProcFlagsSdnv.text, blkProcFlagsSdnv.length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8660:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, payloadLengthSdnv.text, payloadLengthSdnv.length);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8761:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*strings[8];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8847:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, strings[i], stringLengths[i]);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:9089:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		destDuctName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:9949:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) bundle, (char *) &firstBundle,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:10050:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		proxNodeEid[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/library/libbpP.c:10284:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) extendedCOS, (char *) &bundle.extendedCOS,
data/ion-3.2.1+dfsg/bp/library/libbpP.c:10349:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, buffer + bytesParsed, *bytesBuffered);
data/ion-3.2.1+dfsg/bp/library/libbpnm.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            computedName [BPNM_ENDPOINT_EIDSTRING_LEN];
data/ion-3.2.1+dfsg/bp/library/libbpnm.c:127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            computedName [BPNM_ENDPOINT_EIDSTRING_LEN];
data/ion-3.2.1+dfsg/bp/ltp/ltpclo.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		destDuctName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		protocolName[MAX_CL_PROTOCOL_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ductName[MAX_CL_DUCT_NAME_LEN];
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:98:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(id->socketName), socketName, sizeof(struct sockaddr));
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	protocolName[MAX_CL_PROTOCOL_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ductName[MAX_CL_DUCT_NAME_LEN];
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	protocolName[MAX_CL_PROTOCOL_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:273:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ductName[MAX_CL_DUCT_NAME_LEN];
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:497:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer + 1,lengthField.text,lengthField.length);
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:795:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    hostNameBuf[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:817:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer + bytesToSend,&keepaliveIntervalNBO,2);
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:823:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer + bytesToSend, eidLength.text, eidLength.length);
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:827:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer + bytesToSend, adminEidString, adminEidLength);
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:924:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&requestedKeepAlive, &buffer[2],2);
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:1039:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buffer + 2,&delay_uint16,2);
data/ion-3.2.1+dfsg/bp/tcp/stcpcli.c:349:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(atp.inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/bp/tcp/stcpcli.c:403:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/bp/tcp/stcpclo.c:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			destDuctName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/tcp/stcpclo.c:214:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/bp/tcp/stcpclo.c:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/bp/tcp/tcpcli.c:544:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(atp.inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/bp/tcp/tcpcli.c:607:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char txt[500];
data/ion-3.2.1+dfsg/bp/tcp/tcpclo.c:274:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			destDuctName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/tcp/tcpclo.c:362:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/bp/tcp/tcpclo.c:427:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/bp/test/bpchat.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            lineBuffer[1024];
data/ion-3.2.1+dfsg/bp/test/bpchat.c:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            buffer[1024];
data/ion-3.2.1+dfsg/bp/test/bpcounter.c:76:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int		maxCount = (argc > 2 ? atoi(argv[2]) : 0);
data/ion-3.2.1+dfsg/bp/test/bpcounter.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textBuf[256];
data/ion-3.2.1+dfsg/bp/test/bpdriver.c:64:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buffer[DEFAULT_ADU_LENGTH] = "test...";
data/ion-3.2.1+dfsg/bp/test/bpdriver.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textBuf[256];
data/ion-3.2.1+dfsg/bp/test/bpdriver.c:384:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	cyclesRemaining = atoi((char *) a1);
data/ion-3.2.1+dfsg/bp/test/bpdriver.c:387:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	aduLength = (a4 == 0 ? DEFAULT_ADU_LENGTH : atoi((char *) a4));
data/ion-3.2.1+dfsg/bp/test/bpdriver.c:389:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int 	ttl = (a5 == 0 ? DEFAULT_TTL : atoi((char *) a5));
data/ion-3.2.1+dfsg/bp/test/bpdriver.c:406:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				ttl = atoi(&argv[5][1]);
data/ion-3.2.1+dfsg/bp/test/bpdriver.c:410:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			aduLength = atoi(argv[5]);
data/ion-3.2.1+dfsg/bp/test/bpdriver.c:415:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				ttl = atoi(&argv[4][1]);
data/ion-3.2.1+dfsg/bp/test/bpdriver.c:419:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			aduLength = atoi(argv[4]);
data/ion-3.2.1+dfsg/bp/test/bpdriver.c:426:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		cyclesRemaining = atoi(argv[1]);
data/ion-3.2.1+dfsg/bp/test/bpecho.c:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dataToSend[ADU_LEN];
data/ion-3.2.1+dfsg/bp/test/bpecho.c:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 	char		sourceEid[1024];
data/ion-3.2.1+dfsg/bp/test/bping.c:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char        buffer[BPING_PAYLOAD_MAX_LEN];
data/ion-3.2.1+dfsg/bp/test/bping.c:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char        respSrcEid[64];
data/ion-3.2.1+dfsg/bp/test/bping.c:270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    pingPayload[BPING_PAYLOAD_MAX_LEN];
data/ion-3.2.1+dfsg/bp/test/bping.c:368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char myflags[1024];
data/ion-3.2.1+dfsg/bp/test/bping.c:411:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				count = atoi(optarg);
data/ion-3.2.1+dfsg/bp/test/bping.c:414:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				interval = atoi(optarg);
data/ion-3.2.1+dfsg/bp/test/bping.c:421:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				priority = atoi(optarg);
data/ion-3.2.1+dfsg/bp/test/bping.c:424:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				waitdelay = atoi(optarg);
data/ion-3.2.1+dfsg/bp/test/bping.c:430:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				ttl = atoi(optarg);
data/ion-3.2.1+dfsg/bp/test/bpsink.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		content[80];
data/ion-3.2.1+dfsg/bp/test/bpsink.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[84];
data/ion-3.2.1+dfsg/bp/test/bpsource.c:55:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int 	ttl = (a5 == 0 ? DEFAULT_TTL : atoi((char *) a5));
data/ion-3.2.1+dfsg/bp/test/bpsource.c:70:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ttl=atoi(&argv[3][2]);
data/ion-3.2.1+dfsg/bp/test/bpsource.c:78:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ttl=atoi(&argv[2][2]);
data/ion-3.2.1+dfsg/bp/test/bpsource.c:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[256];
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:19:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char   theBuffer[2048];
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:70:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[0], (char *) &cosStats.tallies[0],
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[1], (char *) &cosStats.tallies[1],
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:74:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[2], (char *) &cosStats.tallies[2],
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:88:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[3], (char *)
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:96:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[0], (char *) &cosStats.tallies[0],
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:98:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[1], (char *) &cosStats.tallies[1],
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:100:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[2], (char *) &cosStats.tallies[2],
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:111:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[0], (char *) &cosStats.tallies[0],
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:113:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[1], (char *) &cosStats.tallies[1],
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:115:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[2], (char *) &cosStats.tallies[2],
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:143:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[3], (char *)
data/ion-3.2.1+dfsg/bp/test/bpstats2.c:154:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &tallies[3], (char *)
data/ion-3.2.1+dfsg/bp/udp/udpcli.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			hostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/bp/udp/udpcli.c:87:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &hostNbr,
data/ion-3.2.1+dfsg/bp/udp/udpcli.c:206:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/bp/udp/udpcli.c:243:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/bp/udp/udpclo.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			destDuctName[MAX_CL_DUCT_NAME_LEN + 1];
data/ion-3.2.1+dfsg/bp/udp/udpclo.c:168:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &(inetName->sin_addr.s_addr),
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:74:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	logLevelRequested = atoi(tokens[1]);
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:80:24:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		heapWordsRequested = atol(tokens[2]);
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:101:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char text[200];
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:115:12:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	acsSize = atol(tokens[2]);
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:125:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		acsDelay = atol(tokens[3]);
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:151:21:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	minimumCustodyId = atol(tokens[1]);
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:191:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*tokens[9];
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256];
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:337:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		cmdFile = fopen(cmdFileName, "r");
data/ion-3.2.1+dfsg/bp/utils/acslist.c:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char acslistBuf[256];									\
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:277:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			protocolClass = atol(tokens[6]);
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:282:18:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			nominalRate = atol(tokens[5]);
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:285:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		addProtocol(tokens[2], atoi(tokens[3]), atoi(tokens[4]),
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:285:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		addProtocol(tokens[2], atoi(tokens[3]), atoi(tokens[4]),
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:491:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fwdCmdBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:493:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	admAppCmdBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:495:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[1024];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:554:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[512];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:556:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	recvScriptBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:651:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cliCmdBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:653:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[1024];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:703:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cloCmdBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:705:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[1024];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:1187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:1311:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*tokens[9];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:1314:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[80];
data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:1528:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[256];
data/ion-3.2.1+dfsg/bp/utils/bpcancel.c:25:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	unsigned int	creationSec = argc > 2 ? atoi(argv[2]) : 0;
data/ion-3.2.1+dfsg/bp/utils/bpcancel.c:26:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	unsigned int	creationCount = argc > 3 ? atoi(argv[3]) : 0;
data/ion-3.2.1+dfsg/bp/utils/bpcancel.c:27:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	unsigned int	fragmentOffset = argc > 4 ? atoi(argv[4]) : 0;
data/ion-3.2.1+dfsg/bp/utils/bpcancel.c:28:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	unsigned int	fragmentLength = argc > 5 ? atoi(argv[5]) : 0;
data/ion-3.2.1+dfsg/bp/utils/bplist.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	entry[300];
data/ion-3.2.1+dfsg/bp/utils/bplist.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[100];
data/ion-3.2.1+dfsg/bp/utils/bplist.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	digits[16] = "0123456789abcdef";
data/ion-3.2.1+dfsg/bp/utils/bplist.c:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[300];
data/ion-3.2.1+dfsg/bp/utils/bplist.c:276:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		msgbuf[256];
data/ion-3.2.1+dfsg/bp/utils/bplist.c:327:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			priority = atoi(cursor + 1);
data/ion-3.2.1+dfsg/bp/utils/bprecvfile.c:52:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buffer[BPRECVBUFSZ];
data/ion-3.2.1+dfsg/bp/utils/bprecvfile.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fileName[64];
data/ion-3.2.1+dfsg/bp/utils/bprecvfile.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		completionText[80];
data/ion-3.2.1+dfsg/bp/utils/bptrace.c:242:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ttl = atoi(argv[4]);
data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:481:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:518:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(GRAPHVIZ_FILENAME, "w");
data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:605:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(IMAGE_FILENAME, "r");
data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:795:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		minLatency = ((char *)(a6))[0] == '1';
data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:800:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		outputFile = fopen(a7, "w");
data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:871:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			outputFile = fopen(optarg, "w");
data/ion-3.2.1+dfsg/bp/utils/hmackeys.c:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fileName[256];
data/ion-3.2.1+dfsg/bp/utils/hmackeys.c:21:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	key[20];
data/ion-3.2.1+dfsg/bp/utils/hmackeys.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[80];
data/ion-3.2.1+dfsg/bp/utils/lgsend.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[256];
data/ion-3.2.1+dfsg/bss/library/bssP.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		eid[32];
data/ion-3.2.1+dfsg/bss/library/libbssP.c:821:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		error[3] = "-1";
data/ion-3.2.1+dfsg/bss/library/libbssP.c:1122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		fileName[255];
data/ion-3.2.1+dfsg/bss/library/libbssP.c:1129:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*dat = open(fileName, O_RDWR | O_CREAT | O_LARGEFILE, 0666);
data/ion-3.2.1+dfsg/bss/library/libbssP.c:1137:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*lst = open(fileName, O_RDWR | O_CREAT, 0666);
data/ion-3.2.1+dfsg/bss/library/libbssP.c:1146:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*tbl = open(fileName, O_RDWR | O_CREAT, 0666);
data/ion-3.2.1+dfsg/bss/library/libbssP.c:1219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fileName[255];
data/ion-3.2.1+dfsg/bss/library/libbssP.c:1228:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	datRO = open(fileName, O_RDONLY | O_LARGEFILE, 0666);
data/ion-3.2.1+dfsg/bss/library/libbssP.c:1236:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	lstRO = open(fileName, O_RDONLY, 0666);
data/ion-3.2.1+dfsg/bss/library/libbssP.c:1245:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tblRO = open(fileName, O_RDONLY, 0666);
data/ion-3.2.1+dfsg/bss/test/bssStreamingApp.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		framePayload[RCV_LENGTH];
data/ion-3.2.1+dfsg/bss/test/bssStreamingApp.c:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		info[100];
data/ion-3.2.1+dfsg/bss/test/bsscounter.c:41:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &dataValue, buf, sizeof(unsigned int));
data/ion-3.2.1+dfsg/bss/test/bsscounter.c:88:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &dataValue, buffer, sizeof(unsigned int));
data/ion-3.2.1+dfsg/bss/test/bssdriver.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		framePayload[RCV_LENGTH];
data/ion-3.2.1+dfsg/bss/test/bssdriver.c:83:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(framePayload, (char *) &dataValue, sizeof(unsigned int));
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:43:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (atoi(buf) == -1)
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:49:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	reps = atoi(buf)%150; /* Maximum repetitions number of each sequence */
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	parameters[512];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	menuNav[512];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:217:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int 	choice = atoi((char *) a1);
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:223:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	bssName[64];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:224:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	path[256];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	eid[32];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fromTime[TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	toTime[TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	menuNav[512];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:248:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	bssName[64];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	path[256];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	eid[32];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:251:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fromTime[TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:252:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	toTime[TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:301:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		cmd[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:302:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		engineIdString[11];
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:303:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		bsoCmdString[SDRSTRING_BUFSZ + 64];
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1566:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((*cursor), engineIdSdnv->text, engineIdSdnv->length);
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1570:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((*cursor), sessionNbrSdnv.text, sessionNbrSdnv.length);
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1590:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1597:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1728:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		memo[64];
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1851:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		memo[64];
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:2173:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	buf[256];
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:2174:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(buf, "Sending Ack");
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:2346:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char		buf[256];
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:2420:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(buf, "Sent data block: session %u blkTypeCode %d length %d.",
data/ion-3.2.1+dfsg/bssp/tcp/tcpbsi.c:385:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(atp.inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/bssp/tcp/tcpbsi.c:439:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/bssp/tcp/tcpbso.c:179:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/bssp/tcp/tcpbso.c:206:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/bssp/udp/udpbsi.c:156:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/bssp/udp/udpbsi.c:193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char			memoBuf[1000];
data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ownHostName[MAXHOSTNAMELEN];
data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:259:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(peerInetName->sin_addr.s_addr),
data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:271:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(bindInetName->sin_addr.s_addr),
data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:316:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	memoBuf[1024];
data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:387:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(ownInetName->sin_addr.s_addr),
data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:257:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmd[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:258:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[256];
data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:342:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[128];
data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:437:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:525:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*tokens[12];
data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:526:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[80];
data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:713:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[256];
data/ion-3.2.1+dfsg/cfdp/bp/bputa.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ownEid[64];
data/ion-3.2.1+dfsg/cfdp/bp/bputa.c:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ownEid[64];
data/ion-3.2.1+dfsg/cfdp/bp/bputa.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		destEid[64];
data/ion-3.2.1+dfsg/cfdp/bp/bputa.c:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		reportToEidBuf[64];
data/ion-3.2.1+dfsg/cfdp/bp/bputa.c:198:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) &utParms, (char *) &fduBuffer.utParms,
data/ion-3.2.1+dfsg/cfdp/daemon/cfdpclock.c:149:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) &fdu->transactionId,
data/ion-3.2.1+dfsg/cfdp/daemon/cfdpclock.c:167:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) &fdu->transactionId,
data/ion-3.2.1+dfsg/cfdp/include/cfdp.h:51:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buffer[8];	/*	Right-justified value.	*/
data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:79:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		utParms[sizeof(BpUtParms)];
data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:157:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			proxySourceFileName[256];
data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			proxyDestFileName[256];
data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:164:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		proxyFlowLabel[256];
data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			directoryName[256];
data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			directoryDestFileName[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:139:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	defaultReaderBuf[CFDP_MAX_PDU_SIZE];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:170:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	pktReaderBuf[CFDP_MAX_PDU_SIZE];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:260:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	textReaderBuf[CFDP_MAX_PDU_SIZE];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:670:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer, "cfdp", 4);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:687:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer, transactionId->sourceEntityNbr.buffer
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:690:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer, transactionId->transactionNbr.buffer
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:704:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char	mpduBuf[CFDP_MAX_PDU_SIZE];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:718:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			firstFileName[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:720:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			secondFileName[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:721:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		msgText[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:740:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, (char *) &fileSize, 4);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:761:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, sourceFileName, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:774:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, destFileName, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:859:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cursor, firstFileName, firstFileNameLen);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:865:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cursor, secondFileName, secondFileNameLen);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:918:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cursor, (char *) msgText, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:943:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cursor, (char *) msgText, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1007:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cursor, flowLabel, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1030:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	eofBuf[10];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1037:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eofBuf + 2, (char *) &u4, 4);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1039:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eofBuf + 6, (char *) &u4, 4);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1107:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fdu.utParms, utParms, utParmsLength);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1273:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &fdu.originatingTransactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1322:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &fdu.transactionId.sourceEntityNbr,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1333:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &fdu.destinationEntityNbr,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1360:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) &fdu.transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1362:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) transactionId, (char *) &fdu.transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1510:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1556:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		reportBuffer[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1568:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1597:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		reportBuffer[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1609:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1667:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textBuffer[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1722:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) transactionId, (char *) &event.transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1752:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) originatingTransactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1796:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) &opsData.originatingTransactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1847:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) &opsData.originatingTransactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1883:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) originatingTransactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1923:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fileName[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:246:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char	buffer[CFDP_MAX_PDU_SIZE];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:985:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &fdubuf->transactionId, (char *) transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1126:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1161:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1258:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1386:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fileName[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1397:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1712:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			firstFileNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1714:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			secondFileNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1718:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			msgBuf[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1999:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	workingFileName[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2000:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	destFileName[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2001:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	qualifiedFileName[MAXPATHLEN + 2];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2002:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	renameErrBuffer[600];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2023:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		workingFileName[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2024:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		reportBuffer[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2032:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) &fduBuf->transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2242:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &event.transactionId, (char *) transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2382:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	pduHeader[28];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2466:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pduHeader + pduHeaderLength, cfdpdb.ownEntityNbr.buffer
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2469:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pduHeader + pduHeaderLength,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2474:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pduHeader + pduHeaderLength,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2489:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) buf, pduHeader, pduHeaderLength);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2668:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		stringBuf[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2669:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		workingNameBuffer[MAXPATHLEN + 2];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2698:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) &fdu->transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2975:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			firstNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2977:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			secondNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3001:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(firstNameBuf, *cursor, firstNameLength);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3024:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(secondNameBuf, *cursor, secondNameLength);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3200:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fdu->eofFaultLocation.buffer + padLength, *cursor, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3350:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) &fdu->transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		stringBuf[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3405:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringBuf, cursor, i);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3426:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringBuf, cursor, i);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3474:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &event.transactionId, (char *) &fdu->transactionId,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3612:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sourceEntityNbr.buffer + entityNbrPad, cursor, entityNbrLength);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3616:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(transactionNbr.buffer + transactionNbrPad, cursor,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3621:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(destinationEntityNbr.buffer + entityNbrPad, cursor,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3648:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &deliveredCRC, buf + length, 2);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3679:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &transactionId.sourceEntityNbr,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3681:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &transactionId.transactionNbr,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:51:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->proxyDestinationEntityNbr.buffer + pad, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:70:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->proxySourceFileName, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:90:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->proxyDestFileName, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			nameBuffer[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:198:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nameBuffer, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:222:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nameBuffer, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:296:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->proxyFlowLabel, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:333:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			nameBuffer[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:379:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nameBuffer, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:403:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nameBuffer, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:427:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nameBuffer, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:488:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->originatingTransactionId.sourceEntityNbr.buffer
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:496:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->originatingTransactionId.transactionNbr.buffer
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:509:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		textBuffer[6];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:522:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer, "cfdp", 4);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:616:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	textBuffer[600];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:681:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer, "cfdp", 4);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:690:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer + length, beneficiaryEntityNbr->buffer + pad,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:695:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer + length, task->sourceFileName,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:700:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer + length, task->destFileName, destFileNameLen);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:881:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(textBuffer + length, task->flowLabel,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:944:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	textBuffer[5];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:964:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer, "cfdp", 4);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1040:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->directoryName, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1060:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->directoryDestFileName, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1093:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->directoryName, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1113:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->directoryDestFileName, text, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1126:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		textBuffer[600];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1145:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer, "cfdp", 4);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1149:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer + 7, opsData->directoryName, dirNameLen);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1151:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer + 7 + dirNameLen + 1, opsData->directoryDestFileName,
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		listingFileName[256];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		listingLine[300];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1233:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	textBuffer[600];
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1257:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer, "cfdp", 4);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1265:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer + length, task->directoryName, directoryNameLen);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1269:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(textBuffer + length, task->destFileName, destFileNameLen);
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			sourceFileNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			destFileNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:329:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	oK(cfdp_add_usrmsg(*msgsToUser, (unsigned char *) tokens[1],
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:349:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			action = atoi(tokens[1]);
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:370:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*tokens[9];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:554:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			sourceFileNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:555:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			destFileNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:565:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			statusReportBuf[256];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:567:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		usrmsgBuf[256];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:570:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			firstPathName[256];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:571:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			secondPathName[256];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			msgBuf[256];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:644:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:715:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256];
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:740:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		cmdFile = open(cmdFileName, O_RDONLY, 0777);
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:62:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char 				tmp_files[NUM_TMP_FILES][255];		/*tmp filename array*/
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:83:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	iamrecursive = atoi((char*)a1);
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:100:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	t = atoi((char*)a3);
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:121:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	debug=atoi((char*)a5);
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:417:11:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	tempfd = mkstemp(template);
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1006:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1145:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(buff, dp->d_name,_D_EXACT_NAMLEN(dp));
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1252:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cwd[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1284:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&tt, t, sizeof(struct transfer));
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1352:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				sourceFileNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1353:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				destFileNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				statusReportBuf[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1365:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		usrmsgBuf[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1549:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->directoryName, text, length);
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1566:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opsData->directoryDestFileName, text, length);
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			sourceFileNameBuf[256];		/*Buffer for name of source file*/
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			destFileNameBuf[256];		/*Buffer for name of destination file*/
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			dhost[256];		/*Destination Hostname*/
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			dfile[256];		/*Destination Filename*/
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			shost[256];		/*Source Hostname*/
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			sfile[256];		/*Source Filename*/
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		directoryName[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		directoryDestFileName[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:30:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
debug=atoi((char*)a1);
data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:33:4:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
if(atoi((char*)a2)==1)
data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				sourceFileNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				destFileNameBuf[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				statusReportBuf[256];
data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:126:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		usrmsgBuf[256];
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:129:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	newDiscard = atoi(tokens[2]);
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:159:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	newRequirecrc = atoi(tokens[2]);
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:220:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	newCkperiod = atoi(tokens[2]);
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:250:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	newMaxtimeouts = atoi(tokens[2]);
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:280:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	newMaxtrnbr = atoi(tokens[2]);
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:310:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	newSegsize = atoi(tokens[2]);
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:340:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	newLimit = atoi(tokens[2]);
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:420:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[256];
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:438:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:515:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*tokens[9];
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:516:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[80];
data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:670:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_api.c:420:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char buf[128];
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_types.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uri[AL_BP_MAX_ENDPOINT_ID]; //256
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:199:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	            memcpy(dtn_bundle_spec.blocks.blocks_val[i].data.data_val,
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:224:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	            memcpy(dtn_bundle_spec.metadata.metadata_val[i].data.data_val,
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dtn_bundle_payload.buf.buf_val, bundle_payload.buf.buf_val, bundle_payload.buf.buf_len);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:386:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bp_bundle_payload.buf.buf_val, bundle_payload.buf.buf_val, bundle_payload.buf.buf_len);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:259:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tokenClassOfService,"%1u.%1u.%lu.%1u.%1u.%lu", tmpCustody, tmpPriority, (unsigned long) spec->priority.ordinal, 
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:589:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rpt->sourceEid, cursor, eidLength);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:277:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(payload.buf.buf_val, buffer, bundle_payload.length);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:281:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int fd = open(filename,O_CREAT|O_WRONLY, S_IRUSR | S_IWUSR);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:217:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		*f = fopen(buffer, "rb");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:249:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		*f = fopen(buffer, "wb");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:609:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*payload, buf, buf_size);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[50];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:24:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%ld.%ld;", result->tv_sec, result->tv_usec);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[50];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:38:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%lu;%lu;", timestamp.secs, timestamp.seqno);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[300];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:46:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(buf, "Dlv;");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:47:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(buf, "Ct;");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:48:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(buf, "Rcv;");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:49:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(buf, "Fwd;");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:50:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(buf, "Del;");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:56:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(buf, "Reason;");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf1[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf2[50];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:67:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, "%lu;", status_report.delivery_ts.secs);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:69:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, " ; ");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:73:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, "%lu;", status_report.custody_ts.secs);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:75:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, " ;");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:79:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, "%lu;", status_report.receipt_ts.secs);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:81:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, " ;");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:85:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, "%lu;", status_report.forwarding_ts.secs);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:87:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, " ;");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:91:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, "%lu;", status_report.deletion_ts.secs);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:93:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, " ;");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[50];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:115:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%ld", num);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[50];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:122:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%lu", num);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_main.c:65:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ((fd = open(perf_opt.server_output_file,O_WRONLY | O_CREAT | O_TRUNC, 0644)) > 0)
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_main.c:112:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					if ((fd = open(perf_opt.monitor_output_file,O_WRONLY | O_CREAT | O_TRUNC, 0644)) > 0)
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:66:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char source_file[256];					// complete name of source file: SOURCE_FILE_pid[_numBundle]
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp1[256]; // buffer for various purpose
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp2[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:148:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((log_file = fopen(perf_opt->log_filename, "w")) == NULL)
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:598:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((transfer_fd = open(perf_opt->F_arg, O_RDONLY)) < 0)
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:839:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		stream = fopen(source_file,	"wb");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:924:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf+HEADER_SIZE+BUNDLE_OPT_SIZE+sizeof(al_bp_timeval_t), &bundle.payload->buf.buf_crc, BUNDLE_CRC_SIZE);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1625:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			perf_opt->window = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1643:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			perf_opt->transmission_time = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1711:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			conn_opt->expiration = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1762:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int debug_level = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1764:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					perf_opt->debug_level = atoi(optarg) - 1;
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1797:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			perf_opt->ip_port = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1813:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			perf_opt->bundle_ack_options.ack_expiration = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1845:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			conn_opt->priority.ordinal = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1878:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			conn_opt->flow_label = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1893:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				perf_opt->metadata_type = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:410:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(filename, "%lu_", relative_creation_timestamp.secs);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:428:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(filename, ".csv");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:432:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				file = fopen(full_filename, "w");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:465:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&start, session->start, sizeof(struct timeval));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:719:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:754:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				perf_opt->expiration_session = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:760:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					int debug_level = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:762:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						perf_opt->debug_level = atoi(optarg) -1;
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:791:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				perf_opt->ip_port = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:890:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->start, &start, sizeof(struct timeval));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:675:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char filename_ack[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:695:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					fd_ack = open(filename_ack,O_WRONLY|O_CREAT,0777);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:944:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:988:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			conn_opt->expiration = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1009:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int debug_level = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1011:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					perf_opt->debug_level = atoi(optarg) - 1;
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1052:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			perf_opt->ip_port = atoi(optarg);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_types.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 							dest_eid[AL_BP_MAX_ENDPOINT_ID];	// destination eid
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_types.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 							mon_eid[AL_BP_MAX_ENDPOINT_ID];		// monitor eid
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:188:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_WRONLY | O_CREAT, 0755);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:229:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char * eid, temp[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:247:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char monitor_eid[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:289:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(temp, "%lu_", timestamp.secs);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:339:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((file = fopen(filename, "r")) != NULL)
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:351:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char * result, buffer[100];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:365:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline_file[100];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:366:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256], cmdline[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:367:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd_exe[256], cmdline_exe[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd_args[256], cmdline_args[256];
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:402:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(cmdline_file, O_RDONLY);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:442:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pid = atoi(item->d_name);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		content[1];
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:266:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		inputBuffer[DGR_BUF_SIZE];
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:267:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		outputBuffer[DGR_BUF_SIZE];
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:303:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tracebuf[128];
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:760:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:767:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:780:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:787:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:794:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:801:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:808:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:814:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, rec->segment.content, rec->contentLength);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1687:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(reportBuffer, sap->inputBuffer, headerLength);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1695:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1725:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(reportBuffer, sap->inputBuffer, headerLength);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1733:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1740:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1747:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1754:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1761:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1768:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1775:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1818:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			reportBuffer[64];
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:2104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rec->segment.content, cursor, svcDataLength);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:2383:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) ipAddress, (char *) &(nm->sin_addr.s_addr), 4);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:2493:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rec->segment.content, content, length);
data/ion-3.2.1+dfsg/dgr/library/libdgr.c:2691:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(content, rec->segment.content, rec->contentLength);
data/ion-3.2.1+dfsg/dgr/test/dgr2file.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fileName[256];
data/ion-3.2.1+dfsg/dgr/test/dgr2file.c:31:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	outputFile = fopen(fileName, "a");
data/ion-3.2.1+dfsg/dgr/test/dgr2file.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ownHostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/dgr/test/dgr2file.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256];
data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ownHostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256];
data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:120:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	inputFile = fopen(fileName, "r");
data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:159:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				inputFile = fopen(fileName, "r");
data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:237:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		cyclesRequested = atoi(argv[3]);
data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			line[256];
data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:197:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nbrOfPeers = atoi(argv[3]);
data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:205:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		cyclesRequested = atoi(argv[4]);
data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:228:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	inputFile = fopen(fileName, "r");
data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:263:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				inputFile = fopen(fileName, "r");
data/ion-3.2.1+dfsg/dgr/test/file2udp.c:323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[256];
data/ion-3.2.1+dfsg/dgr/test/file2udp.c:327:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, (char *) &seqCounter, 40);
data/ion-3.2.1+dfsg/dgr/test/file2udp.c:328:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer + 4, line, lineLen);
data/ion-3.2.1+dfsg/dgr/test/file2udp.c:375:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			line[256];
data/ion-3.2.1+dfsg/dgr/test/file2udp.c:389:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		cyclesRequested = atoi(argv[3]);
data/ion-3.2.1+dfsg/dgr/test/file2udp.c:407:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/dgr/test/file2udp.c:418:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	inputFile = fopen(fileName, "r");
data/ion-3.2.1+dfsg/dgr/test/file2udp.c:444:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				inputFile = fopen(fileName, "r");
data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fileName[256];
data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:125:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	outputFile = fopen(fileName, "a");
data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ownHostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			line[256];
data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:159:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/dgr/test/udp2file.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fileName[256];
data/ion-3.2.1+dfsg/dgr/test/udp2file.c:30:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	outputFile = fopen(fileName, "a");
data/ion-3.2.1+dfsg/dgr/test/udp2file.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ownHostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/dgr/test/udp2file.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			line[256];
data/ion-3.2.1+dfsg/dgr/test/udp2file.c:63:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4);
data/ion-3.2.1+dfsg/dtpc/daemon/dtpcd.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ownEid[64];
data/ion-3.2.1+dfsg/dtpc/daemon/dtpcd.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ownEid[64];
data/ion-3.2.1+dfsg/dtpc/library/libdtpc.c:186:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) *dtpcsapPtr, (char *) &sap, sizeof(Sap));
data/ion-3.2.1+dfsg/dtpc/library/libdtpc.c:273:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		srcEid[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/dtpc/library/libdtpc.c:415:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) dlvBuffer->srcEid, (char *) srcEid, SDRSTRING_BUFSZ);
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) vprofile, (char *) profile, sizeof(Profile));
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:660:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		eidBuf[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:911:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, profNum.text, profNum.length);
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:913:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, seqNum.text, seqNum.length);
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:957:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, topicID.text, topicID.length);
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:959:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, recordsCounter.text, recordsCounter.length);
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:1044:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		reportToEid[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:1045:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dstEid[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:1406:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		repToEid[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:1744:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		srcEid[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2490:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		srcEid[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2608:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	dstEid[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2609:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	srcEid[64];
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2717:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dstEid[64];
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2790:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, profileIdSdnv.text, profileIdSdnv.length);
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2792:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, seqNumSdnv.text, seqNumSdnv.length);
data/ion-3.2.1+dfsg/dtpc/test/dtpcreceive.c:98:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int		topicID = (argc > 1 ? atoi(argv[1]) : 0);
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:90:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buffer[BUF_SIZE] = "this is a testfile created by \
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		totalbytes[21];
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:268:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	cycles = atoi((char *) a1);
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:269:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	rate = atoi((char *) a2);
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:270:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	recordLength = atoi((char *) a3);
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:271:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	topicID = atoi((char *) a4);
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:272:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	profileID = atoi((char *) a5);
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:290:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		profileID = atoi(argv[5]);
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:292:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  	topicID = atoi(argv[4]);
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:294:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		recordLength = atoi(argv[3]);
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:296:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		rate = atoi(argv[2]);
data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:298:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		cycles = atoi(argv[1]);
data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[256];
data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	sdrBuf[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:164:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	profileID = atoi(tokens[2]);
data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[80];
data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:416:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*tokens[10];
data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:417:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[80];
data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:596:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[512];
data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:642:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		cmdFile = open(cmdFileName, O_RDONLY, 0777);
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:51:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void	sha1_hmac(const unsigned char *key, size_t keylen,
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:52:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const unsigned char *input, size_t ilen,
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:53:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char output[20])
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:58:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void	sha2(const unsigned char *input, size_t ilen,
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:59:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char output[32], int is224)
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:111:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(output, input, length);
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:134:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(context, key, key_length);
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:155:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result, context, resultLen);
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:163:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void	hmac_sha1_sign(const unsigned char *key, size_t keylen,
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:164:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const unsigned char *input, size_t ilen,
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:165:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char output[20])
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:197:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(context, key, key_length);
data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:218:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result, context, resultLen);
data/ion-3.2.1+dfsg/ici/daemon/winion.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	memName[32];
data/ion-3.2.1+dfsg/ici/daemon/winion.c:32:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(memName, "%d.mmap", key);
data/ion-3.2.1+dfsg/ici/daemon/winion.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	semaphoreName[32];
data/ion-3.2.1+dfsg/ici/daemon/winion.c:48:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(semaphoreName, "%d.event", key);
data/ion-3.2.1+dfsg/ici/daemon/winion.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		msg[5];
data/ion-3.2.1+dfsg/ici/daemon/winion.c:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		reply[1] = { '\0' };
data/ion-3.2.1+dfsg/ici/daemon/winion.c:165:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) &key, msg + 1, sizeof(DWORD));
data/ion-3.2.1+dfsg/ici/include/crypto.h:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	m[256];			/*!< permutation table */
data/ion-3.2.1+dfsg/ici/include/crypto.h:75:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern void	hmac_sha1_sign(const unsigned char *key, size_t keylen,
data/ion-3.2.1+dfsg/ici/include/crypto.h:76:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const unsigned char *input, size_t ilen,
data/ion-3.2.1+dfsg/ici/include/crypto.h:77:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char output[20]);
data/ion-3.2.1+dfsg/ici/include/ion.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	sdrName[MAX_SDR_NAME + 1];
data/ion-3.2.1+dfsg/ici/include/ion.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pathName[MAXPATHLEN + 1];
data/ion-3.2.1+dfsg/ici/include/ion.h:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		workingDirectoryName[256];
data/ion-3.2.1+dfsg/ici/include/ionsec.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[32];	/*	NULL-terminated.	*/
data/ion-3.2.1+dfsg/ici/include/ionsec.h:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ciphersuiteName[32];	/*	NULL-terminated.	*/
data/ion-3.2.1+dfsg/ici/include/ionsec.h:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	keyName[32];		/*	NULL-terminated.	*/
data/ion-3.2.1+dfsg/ici/include/ionsec.h:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ciphersuiteName[32];	/*	NULL-terminated.	*/
data/ion-3.2.1+dfsg/ici/include/ionsec.h:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	keyName[32];		/*	NULL-terminated.	*/
data/ion-3.2.1+dfsg/ici/include/ionsec.h:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ciphersuiteName[32];	/*	NULL-terminated.	*/
data/ion-3.2.1+dfsg/ici/include/ionsec.h:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	keyName[32];		/*	NULL-terminated.	*/
data/ion-3.2.1+dfsg/ici/include/ionsec.h:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ciphersuiteName[32];	/*	NULL-terminated.	*/
data/ion-3.2.1+dfsg/ici/include/ionsec.h:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	keyName[32];		/*	NULL-terminated.	*/
data/ion-3.2.1+dfsg/ici/include/ionsec.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		keyName[32];
data/ion-3.2.1+dfsg/ici/include/ionsec.h:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		keyName[32];
data/ion-3.2.1+dfsg/ici/include/platform.h:161:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define iopen(a,b,c)		open(a,b,c)
data/ion-3.2.1+dfsg/ici/include/platform.h:605:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	text[10];
data/ion-3.2.1+dfsg/ici/include/psm.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		partitionName[32];
data/ion-3.2.1+dfsg/ici/include/sdrmgt.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sdrName[MAX_SDR_NAME + 1];
data/ion-3.2.1+dfsg/ici/library/ion.c:308:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char		ionLogFileName[264] = "";
data/ion-3.2.1+dfsg/ici/library/ion.c:311:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			timestampBuffer[20];
data/ion-3.2.1+dfsg/ici/library/ion.c:313:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char		msgbuf[256];
data/ion-3.2.1+dfsg/ici/library/ion.c:391:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nodeListFileName[265];
data/ion-3.2.1+dfsg/ici/library/ion.c:395:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		lineBuf[256];
data/ion-3.2.1+dfsg/ici/library/ion.c:398:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		lineSdrName[MAX_SDR_NAME + 1];
data/ion-3.2.1+dfsg/ici/library/ion.c:399:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		lineWdName[256];
data/ion-3.2.1+dfsg/ici/library/ion.c:611:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	eventName[32];
data/ion-3.2.1+dfsg/ici/library/ion.c:615:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(eventName, "%u.sigterm", (unsigned int) processId);
data/ion-3.2.1+dfsg/ici/library/ion.c:809:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		wdname[256];
data/ion-3.2.1+dfsg/ici/library/ion.c:886:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iondbBuf.workingDirectoryName, wdname, 256);
data/ion-3.2.1+dfsg/ici/library/ion.c:898:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&iondbBuf.parmcopy, parms, sizeof(IonParms));
data/ion-3.2.1+dfsg/ici/library/ion.c:1048:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		wdnamebuf[256];
data/ion-3.2.1+dfsg/ici/library/ion.c:1201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	textbuf[RFX_NOTE_LEN];
data/ion-3.2.1+dfsg/ici/library/ion.c:1533:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ownHostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ici/library/ion.c:1535:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	configFileNameBuffer[PATHLENMAX + 1 + 9 + 1];
data/ion-3.2.1+dfsg/ici/library/ion.c:1537:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[512];
data/ion-3.2.1+dfsg/ici/library/ion.c:1539:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[256];
data/ion-3.2.1+dfsg/ici/library/ion.c:1544:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*tokens[2];
data/ion-3.2.1+dfsg/ici/library/ion.c:1660:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			parms->wmKey = atoi(tokens[1]);
data/ion-3.2.1+dfsg/ici/library/ion.c:1666:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			parms->wmSize = atoi(tokens[1]);
data/ion-3.2.1+dfsg/ici/library/ion.c:1672:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			parms->wmAddress = (char *) atol(tokens[1]);
data/ion-3.2.1+dfsg/ici/library/ion.c:1672:32:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			parms->wmAddress = (char *) atol(tokens[1]);
data/ion-3.2.1+dfsg/ici/library/ion.c:1685:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			parms->sdrWmSize = atoi(tokens[1]);
data/ion-3.2.1+dfsg/ici/library/ion.c:1691:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			parms->configFlags = atoi(tokens[1]);
data/ion-3.2.1+dfsg/ici/library/ion.c:1697:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			parms->heapWords = atoi(tokens[1]);
data/ion-3.2.1+dfsg/ici/library/ion.c:1703:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			parms->heapKey = atoi(tokens[1]);
data/ion-3.2.1+dfsg/ici/library/ion.c:1727:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[512];
data/ion-3.2.1+dfsg/ici/library/ion.c:1857:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		procName[PROC_NAME_LEN];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[512];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:406:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		keyId[32];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:473:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		keyId[32];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:549:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) newRef, (char *) &argRef, sizeof(PubKeyRef));
data/ion-3.2.1+dfsg/ici/library/ionsec.c:654:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		keyId[32];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:711:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		keyId[32];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:805:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		keyId[32];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:862:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		keyId[32];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:1173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	rmStr [5];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:1177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	eidBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:1661:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(outputEid, inputEid, eidLength);
data/ion-3.2.1+dfsg/ici/library/ionsec.c:1758:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	eidBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:2024:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	eidBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ici/library/ionsec.c:2267:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    eidBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ici/library/memmgr.c:99:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char		mem_mgr_name_buffer[(MEMMGR_MAX_NAME + 1)
data/ion-3.2.1+dfsg/ici/library/platform.c:613:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textBuffer[1024];
data/ion-3.2.1+dfsg/ici/library/platform.c:631:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &hostInetAddress, hostInfo->h_addr, 4);
data/ion-3.2.1+dfsg/ici/library/platform.c:639:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textBuffer[128];
data/ion-3.2.1+dfsg/ici/library/platform.c:721:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &hostInetAddress, hostInfo->h_addr, 4);
data/ion-3.2.1+dfsg/ici/library/platform.c:869:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &hostInetAddress, hostInfo->h_addr, 4);
data/ion-3.2.1+dfsg/ici/library/platform.c:1027:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &hostInetAddress, hostInfo->h_addr, 4);
data/ion-3.2.1+dfsg/ici/library/platform.c:1349:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	textBuffer[1024];
data/ion-3.2.1+dfsg/ici/library/platform.c:1366:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	itoa_str[33];
data/ion-3.2.1+dfsg/ici/library/platform.c:1374:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	utoa_str[33];
data/ion-3.2.1+dfsg/ici/library/platform.c:1383:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char		errmsgs[ERRMSGS_BUFSIZE];
data/ion-3.2.1+dfsg/ici/library/platform.c:1389:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			lineNbrBuffer[32];
data/ion-3.2.1+dfsg/ici/library/platform.c:1425:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buffer, errmsgs, spaceFreed);
data/ion-3.2.1+dfsg/ici/library/platform.c:1427:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(errmsgs, errmsgs + spaceFreed, errmsgsLength);
data/ion-3.2.1+dfsg/ici/library/platform.c:1504:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	textBuffer[1024];
data/ion-3.2.1+dfsg/ici/library/platform.c:1544:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char		msgwritebuf[ERRMSGS_BUFSIZE];
data/ion-3.2.1+dfsg/ici/library/platform.c:1586:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	msgdiscardbuf[ERRMSGS_BUFSIZE];
data/ion-3.2.1+dfsg/ici/library/platform.c:2176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	hostnameBuf[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ici/library/platform.c:2195:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		hostnameBuf[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ici/library/platform.c:2276:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	i4 = atoi(delimiter + 1);	/*	Get port number.	*/
data/ion-3.2.1+dfsg/ici/library/platform.c:2434:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fmt[SN_FMT_SIZE];
data/ion-3.2.1+dfsg/ici/library/platform.c:2438:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		scratchpad[64];
data/ion-3.2.1+dfsg/ici/library/platform.c:2516:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(scratchpad, "%d", minFieldLength);
data/ion-3.2.1+dfsg/ici/library/platform.c:2518:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(fmt + fmtLen, scratchpad, numLen);
data/ion-3.2.1+dfsg/ici/library/platform.c:2545:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(scratchpad, "%d", precision);
data/ion-3.2.1+dfsg/ici/library/platform.c:2547:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(fmt + fmtLen, scratchpad,
data/ion-3.2.1+dfsg/ici/library/platform.c:2709:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(scratchpad, "%#lx", (unsigned long) vpval);
data/ion-3.2.1+dfsg/ici/library/platform.c:2719:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffer + stringLength, scratchpad, fieldLength);
data/ion-3.2.1+dfsg/ici/library/platform.c:2784:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, from, copySize);
data/ion-3.2.1+dfsg/ici/library/platform.c:2806:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer + currTextSize, from, copySize);
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	msg[5];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	reply[1];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:183:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg + 1, (char *) &keyDword, sizeof(DWORD));
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	memName[32];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:333:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(memName, "%d.mmap", key);
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:507:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		arg[MAX_ARG_LENGTH + 1];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:571:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf->arg, arg, argLen);
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1044:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	semName[32];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1051:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(semName, "%d.event", SM_SEMKEY);
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1083:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	semName[32];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1085:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(semName, "%d.event", key);
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		semName[32];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1150:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(semName, "%d.event", key);
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	namebuf[33];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2578:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &parms, parm, sizeof(SpawnParms));
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2601:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			namebuf[33];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2827:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cmdLine[256];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2861:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	eventName[32];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2879:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(eventName, "%d.sigterm", task);
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2930:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	eventName[32];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2942:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(eventName, "%u.wakeup", (unsigned int) GetCurrentProcessId());
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2957:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	eventName[32];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2961:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(eventName, "%u.wakeup", (unsigned int) processId);
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:3149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[256];
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:3152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*argv[11];
data/ion-3.2.1+dfsg/ici/library/psm.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[32];
data/ion-3.2.1+dfsg/ici/library/psm.c:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[33];
data/ion-3.2.1+dfsg/ici/library/psm.c:551:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) psp(partition, entryObj), (char *) &entry,
data/ion-3.2.1+dfsg/ici/library/psm.c:628:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) &entry, (char *) psp(partition, entryObj),
data/ion-3.2.1+dfsg/ici/library/psm.c:844:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			textbuf[100];
data/ion-3.2.1+dfsg/ici/library/psm.c:1080:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textbuf[100];
data/ion-3.2.1+dfsg/ici/library/psm.c:1116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			textbuf[100];
data/ion-3.2.1+dfsg/ici/library/psm.c:1255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	textbuf[100];
data/ion-3.2.1+dfsg/ici/library/rfx.c:585:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) psp(ionwm, cxaddr), (char *) cxref, sizeof(IonCXref));
data/ion-3.2.1+dfsg/ici/library/rfx.c:716:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		contactIdString[128];
data/ion-3.2.1+dfsg/ici/library/rfx.c:834:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fromTimeBuffer[TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/ici/library/rfx.c:835:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		toTimeBuffer[TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/ici/library/rfx.c:1081:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) psp(ionwm, rxaddr), (char *) rxref, sizeof(IonRXref));
data/ion-3.2.1+dfsg/ici/library/rfx.c:1171:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) psp(ionwm, rxaddr2), (char *) rxref2, sizeof(IonRXref));
data/ion-3.2.1+dfsg/ici/library/rfx.c:1232:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		rangeIdString[128];
data/ion-3.2.1+dfsg/ici/library/rfx.c:1401:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fromTimeBuffer[TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/ici/library/rfx.c:1402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		toTimeBuffer[TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/ici/library/sptrace.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[32];	/*	for concurrent tracing	*/
data/ion-3.2.1+dfsg/ici/library/sptrace.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[256];
data/ion-3.2.1+dfsg/ici/library/sptrace.c:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[256];
data/ion-3.2.1+dfsg/ici/library/sptrace.c:402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[384];
data/ion-3.2.1+dfsg/ici/library/sptrace.c:404:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf2[256];
data/ion-3.2.1+dfsg/ici/library/zco.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		pathName[256];
data/ion-3.2.1+dfsg/ici/library/zco.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		cleanupScript[256];
data/ion-3.2.1+dfsg/ici/library/zco.c:371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		pathBuf[256];
data/ion-3.2.1+dfsg/ici/library/zco.c:454:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fileRef.pathName, pathName, pathLen);
data/ion-3.2.1+dfsg/ici/library/zco.c:464:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(fileRef.cleanupScript, cleanupScript, scriptLen);
data/ion-3.2.1+dfsg/ici/library/zco.c:485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pathBuf[256];
data/ion-3.2.1+dfsg/ici/library/zco.c:564:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fileRef.pathName, pathName, pathLen);
data/ion-3.2.1+dfsg/ici/library/zco.c:575:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(fileRef.cleanupScript, cleanupScript, scriptLen);
data/ion-3.2.1+dfsg/ici/sdr/sdrP.h:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[32];
data/ion-3.2.1+dfsg/ici/sdr/sdrP.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		pathName[MAXPATHLEN];
data/ion-3.2.1+dfsg/ici/sdr/sdrP.h:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		restartCmd[32];
data/ion-3.2.1+dfsg/ici/sdr/sdrcatlg.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[MAX_SDR_NAME + 1];
data/ion-3.2.1+dfsg/ici/sdr/sdrhash.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	key[255];
data/ion-3.2.1+dfsg/ici/sdr/sdrhash.c:213:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(kvpair.key, key, keyLength);
data/ion-3.2.1+dfsg/ici/sdr/sdrmgt.c:815:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) &trailing, (char *) &nextTrailing,
data/ion-3.2.1+dfsg/ici/sdr/sdrmgt.c:843:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) &leading, (char *) &prevLeading,
data/ion-3.2.1+dfsg/ici/sdr/sdrmgt.c:1085:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[100];
data/ion-3.2.1+dfsg/ici/sdr/sdrstring.c:27:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char	SdrStringBuffer[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ici/sdr/sdrstring.c:67:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stringBuf + 1, from, length);
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:671:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	logfilename[PATHLENMAX + 1 + 32 + 1 + 6 + 1];
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:999:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			logfilename[PATHLENMAX + 1 + 32 + 1 + 6 + 1];
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1002:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			dbfilename[PATHLENMAX + 1 + 32 + 1 + 3 + 1];
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1359:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			dbfilename[PATHLENMAX + 1 + 32 + 1 + 3 + 1];
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1360:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			logfilename[PATHLENMAX + 1 + 32 + 1 + 6 + 1];
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1553:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			dbfilename[PATHLENMAX + 1 + 32 + 1 + 3 + 1];
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1554:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			logfilename[PATHLENMAX + 1 + 32 + 1 + 6 + 1];
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1915:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sdrv->dbsm + into, from, length);
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1961:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(into, sdrv->dbsm + from, length);
data/ion-3.2.1+dfsg/ici/test/file2sdr.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sdrName[256];
data/ion-3.2.1+dfsg/ici/test/file2sdr.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ici/test/file2sdr.c:297:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	configFlags = atoi(argv[1]);
data/ion-3.2.1+dfsg/ici/test/file2sm.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256];
data/ion-3.2.1+dfsg/ici/test/file2sm.c:155:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) psp(wm, lineAddress), line, lineLen);
data/ion-3.2.1+dfsg/ici/test/owltsim.c:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		toNode[33];
data/ion-3.2.1+dfsg/ici/test/owltsim.c:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fromNode[33];
data/ion-3.2.1+dfsg/ici/test/owltsim.c:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		destHostName[MAXHOSTNAMELEN + 1];
data/ion-3.2.1+dfsg/ici/test/owltsim.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		content[1];
data/ion-3.2.1+dfsg/ici/test/owltsim.c:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		timebuf[256];
data/ion-3.2.1+dfsg/ici/test/owltsim.c:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			timebuf[256];
data/ion-3.2.1+dfsg/ici/test/owltsim.c:188:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/ici/test/owltsim.c:271:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dg->content, buffer, datagramLen);
data/ion-3.2.1+dfsg/ici/test/owltsim.c:371:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	configFile = fopen(fileName, "r");
data/ion-3.2.1+dfsg/ici/test/owltsim.c:408:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) stp, (char *) &stpBuf,
data/ion-3.2.1+dfsg/ici/test/owlttb.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		content[1];
data/ion-3.2.1+dfsg/ici/test/owlttb.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			timebuf[256];
data/ion-3.2.1+dfsg/ici/test/owlttb.c:170:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(seg->content, buffer, segLength);
data/ion-3.2.1+dfsg/ici/test/owlttb.c:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			timebuf[256];
data/ion-3.2.1+dfsg/ici/test/owlttb.c:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			timebuf[256];
data/ion-3.2.1+dfsg/ici/test/owlttb.c:437:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			timebuf[256];
data/ion-3.2.1+dfsg/ici/test/owlttb.c:525:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(seg->content, buffer, segLength);
data/ion-3.2.1+dfsg/ici/test/owlttb.c:559:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256];
data/ion-3.2.1+dfsg/ici/test/psmshell.c:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256];
data/ion-3.2.1+dfsg/ici/test/psmshell.c:224:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	partitionSize = atoi(argv[1]);
data/ion-3.2.1+dfsg/ici/test/sdr2file.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sdrName[256];
data/ion-3.2.1+dfsg/ici/test/sdr2file.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fileName[256];
data/ion-3.2.1+dfsg/ici/test/sdr2file.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ici/test/sdr2file.c:278:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	configFlags = atoi(argv[1]);
data/ion-3.2.1+dfsg/ici/test/sm2file.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fileName[256];
data/ion-3.2.1+dfsg/ici/test/smlistsh.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256];
data/ion-3.2.1+dfsg/ici/test/smrbtsh.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*tokens[9];
data/ion-3.2.1+dfsg/ici/test/smrbtsh.c:329:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256];
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:214:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		owlt = atoi(tokens[6]);
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:288:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[RFX_NOTE_LEN];
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:365:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[RFX_NOTE_LEN];
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:416:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	newDelta = atoi(tokens[2]);
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:433:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	newMaxClockError = atoi(tokens[2]);
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:456:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[128];
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:466:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		newSyncVal = atoi(tokens[2]);
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:497:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	newRate = atoi(tokens[2]);
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:528:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	newRate = atoi(tokens[2]);
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:708:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[128];
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:857:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*tokens[9];
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:858:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[80];
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:1059:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[256];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:172:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	datValue[1024];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[3];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:209:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		datLen = atoi(tokens[5]);
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:219:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf, cursor, 2);
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:269:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_addBspPibRule(tokens[2], tokens[3], atoi(tokens[4]),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:291:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                sec_addBspPcbRule(tokens[2], tokens[3], atoi(tokens[4]),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:313:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_addLtpRecvAuthRule(atoi(tokens[2]), atouc(tokens[3]),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:335:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_addLtpXmitAuthRule(atoi(tokens[2]), atouc(tokens[3]),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:403:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_updateBspPibRule(tokens[2], tokens[3], atoi(tokens[4]),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:425:60:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                sec_updateBspPcbRule(tokens[2], tokens[3], atoi(tokens[4]),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:447:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_updateLtpRecvAuthRule(atoi(tokens[2]), atouc(tokens[3]),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:469:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_updateLtpXmitAuthRule(atoi(tokens[2]), atouc(tokens[3]),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:514:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_removeLtpRecvAuthRule(atoi(tokens[2]));
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:526:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_removeLtpXmitAuthRule(atoi(tokens[2]));
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:565:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_removeBspPibRule(tokens[2], tokens[3], atoi(tokens[4]));
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:571:60:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                sec_removeBspPcbRule(tokens[2], tokens[3], atoi(tokens[4]));
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:582:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[128];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:594:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		effectiveTime[TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:595:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		assertionTime[TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:597:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	datValue[1024];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:598:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		datValueDisplay[(sizeof datValue * 2)];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:602:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[(sizeof datValueDisplay) * 2];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:638:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	srcEidBuf[SDRSTRING_BUFSZ], destEidBuf[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:639:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[512];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:654:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	srcEidBuf[SDRSTRING_BUFSZ], destEidBuf[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:655:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[512];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:670:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    srcEidBuf[SDRSTRING_BUFSZ], destEidBuf[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:671:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    buf[512];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:686:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[512];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:704:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[512];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:801:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_findBspPibRule(tokens[2], tokens[3], atoi(tokens[4]),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:819:58:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                sec_findBspPcbRule(tokens[2], tokens[3], atoi(tokens[4]),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:837:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_findLtpRecvAuthRule(atoi(tokens[2]), &addr, &elt);
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:854:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec_findLtpXmitAuthRule(atoi(tokens[2]), &addr, &elt);
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:1025:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*tokens[9];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:1026:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:1178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[1024];
data/ion-3.2.1+dfsg/ici/utils/ionwarn.c:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		timestampBuffer[TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/ici/utils/ionwarn.c:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		alarmBuffer[40 + TIMESTAMPBUFSZ];
data/ion-3.2.1+dfsg/ici/utils/ionwarn.c:222:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) np, (char *) neighbor, sizeof(IonNeighbor));
data/ion-3.2.1+dfsg/ici/utils/killm.c:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	msg[5] = {0, 0, 0, 0, 0};
data/ion-3.2.1+dfsg/ltp/aos/aoslsi.c:150:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/ltp/aos/aoslsi.c:187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/ltp/aos/aoslso.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ownHostName[MAXHOSTNAMELEN];
data/ion-3.2.1+dfsg/ltp/aos/aoslso.c:144:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/ltp/aos/aoslso.c:166:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/ltp/daemon/ltpmeter.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		memo[64];
data/ion-3.2.1+dfsg/ltp/dccp/dccplsi.c:377:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/ltp/dccp/dccplso.c:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 	keepalive[4];
data/ion-3.2.1+dfsg/ltp/dccp/dccplso.c:359:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:22:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	null_key[20] = {0xc3, 0x7b, 0x7e, 0x64, 0x92, 0x58, 0x43, 0x40,
data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:96:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	hashValue[32];          
data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		authVal[20];
data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:115:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(authVal, segmentRawData + hashOffset, trailerExt->length);
data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:130:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	hashValue[32];          
data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:365:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	value[1];
data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:424:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	value[32] = "";      
data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:517:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	hashValue[32];
data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:560:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	authVal[512];      
data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:602:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:669:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*cursor, authVal, field->length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ltpmeterCmdString[64];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:341:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmd[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:342:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	engineIdString[11];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:343:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	lsoCmdString[SDRSTRING_BUFSZ + 64];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:1904:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *) psp(ltpwm, addr), (char *) &refbuf,
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2282:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((*cursor), sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2307:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, engineIdSdnv->text, engineIdSdnv->length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2311:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sessionNbrSdnv.text, sessionNbrSdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2365:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2371:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2377:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2389:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2395:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2422:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2428:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2434:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2440:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2447:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2465:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2468:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, sdnv.text, sdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2487:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, serialNbrSdnv.text, serialNbrSdnv.length);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2722:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		memo[64];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3574:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	buf[256];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3575:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(buf, "Sending RS: %u to %u.", rs->pdu.lowerBound, rs->pdu.upperBound);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3600:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char		buf[256];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3783:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(buf, "Reporting %d bytes missing.", shortfall);
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3956:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cwd[200];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3957:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	name[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:4098:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) psp(wm, addr), (char *) &refbuf, sizeof(LtpSegmentRef));
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:4152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fileName[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:4954:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char		buf[256];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:5215:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(buf, "Sent checkpoint: session %u segTypeCode %d length %d offset %d.",
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:5354:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char			buf[256];
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:5764:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(buf, "-   offset %u length %u", claim->offset, claim->length);
data/ion-3.2.1+dfsg/ltp/library/ltpei.c:188:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(extField->value, *cursor, valueLength);
data/ion-3.2.1+dfsg/ltp/library/ltpei.h:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	name[32];
data/ion-3.2.1+dfsg/ltp/sda/libsda.c:93:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buffer[2048];
data/ion-3.2.1+dfsg/ltp/test/ltpcounter.c:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[255];
data/ion-3.2.1+dfsg/ltp/test/ltpdriver.c:19:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buffer[DEFAULT_ADU_LENGTH] = "test...";
data/ion-3.2.1+dfsg/ltp/test/sdatest.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[MAX_LINE_LEN + 1];
data/ion-3.2.1+dfsg/ltp/test/sdatest.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buffer[MAX_LINE_LEN + 1];
data/ion-3.2.1+dfsg/ltp/udp/udplsi.c:152:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4);
data/ion-3.2.1+dfsg/ltp/udp/udplsi.c:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	txt[500];
data/ion-3.2.1+dfsg/ltp/udp/udplso.c:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char			memoBuf[1000];
data/ion-3.2.1+dfsg/ltp/udp/udplso.c:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ownHostName[MAXHOSTNAMELEN];
data/ion-3.2.1+dfsg/ltp/udp/udplso.c:261:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(peerInetName->sin_addr.s_addr),
data/ion-3.2.1+dfsg/ltp/udp/udplso.c:273:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(bindInetName->sin_addr.s_addr),
data/ion-3.2.1+dfsg/ltp/udp/udplso.c:318:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	memoBuf[1024];
data/ion-3.2.1+dfsg/ltp/udp/udplso.c:389:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &(ownInetName->sin_addr.s_addr),
data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmd[SDRSTRING_BUFSZ];
data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[256];
data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:388:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[128];
data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:528:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[80];
data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:652:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*tokens[12];
data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:653:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[80];
data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:845:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[256];
data/ion-3.2.1+dfsg/nm/agent/adm_agent_priv.c:136:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result.value, &gAgentInstr, result.length);
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:219:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result.value, &node_state, sizeof(node_state));
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:220:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result.value + sizeof(node_state), &state, sizeof(state));
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:776:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char names[2048];
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:777:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *ptrs[128];
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:803:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,nm_sdnv.text, nm_sdnv.length);
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:806:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, names, result.length - nm_sdnv.length);
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:816:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:825:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name,entry->value, entry->length);
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:833:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(result.value, &endpoint, sizeof(endpoint));
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:845:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:853:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name,entry->value, entry->length);
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:863:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(result.value, endpoint.eid, result.length);
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:872:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:880:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name,entry->value, entry->length);
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:898:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:906:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name,entry->value, entry->length);
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:925:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:933:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name,entry->value, entry->length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:170:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result.value, &state, result.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:267:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:275:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name,entry->value, entry->length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:285:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(result.value, &induct, result.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:295:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:303:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name,entry->value, entry->length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:313:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(result.value, induct.inductName, result.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:517:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result.value,inducts.value,inducts.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:518:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result.value + inducts.length, outducts.value, outducts.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:527:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char names[2048];
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:528:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *ptrs[128];
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:547:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,nm_sdnv.text, nm_sdnv.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:550:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, names, result.length - nm_sdnv.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:557:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char names[2048];
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:558:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *ptrs[128];
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:580:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,nm_sdnv.text, nm_sdnv.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:583:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, names, result.length - nm_sdnv.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:597:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:605:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name,entry->value, entry->length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:615:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(result.value, &outduct, result.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:626:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:637:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name,entry->value, entry->length);
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:645:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(result.value, outduct.outductName, result.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:206:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result.value, &bytes_reserved, sizeof(bytes_reserved));
data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:207:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(result.value[sizeof(bytes_reserved)]), &bytes_used, sizeof(bytes_used));
data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result.value, &bytes_reserved, sizeof(bytes_reserved));
data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:240:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result.value, &bytes_used, sizeof(bytes_used));
data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:271:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,num_sdnv.text, num_sdnv.length);
data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:277:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor,&val, sizeof(val));
data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:305:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(result.value, &span, sizeof(span));
data/ion-3.2.1+dfsg/nm/agent/ldc.c:272:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    	memcpy(&(rpt->contents[idx]), temp->contents, temp->size);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char last_insert_id[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:193:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(query, "DELETE FROM dbtMIDs WHERE ID=%d", result);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:202:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(query, "ALTER TABLE dbtMIDs AUTO_INCREMENT=%d", result);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:273:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "SELECT * FROM dbtMessagesControls WHERE ID=%d", id);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:301:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int type = atoi(row[1]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:315:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	Lyst contents = db_fetch_mid_col(atoi(row[6]));
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:358:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:365:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "SELECT * FROM dbtDataCollection WHERE CollectionID=%d",
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:431:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:437:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query,
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:515:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	result->length = atoi(row[1]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:531:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result->value, row[2], result->length);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:567:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:570:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "SELECT * FROM dbtMessagesDefinitions WHERE ID=%d", id);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:589:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int mid_id = atoi(row[2]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:590:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int mc_id = atoi(row[3]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:649:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:657:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "SELECT * FROM dbtMIDs WHERE ID=%d", id);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:679:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		uint8_t issFlag = (uint8_t) atoi(row[4]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:680:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		uint8_t tagFlag = (uint8_t) atoi(row[5]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:748:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:753:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query,
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:776:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if((new_mid = db_fetch_mid(atoi(row[0]))) == NULL)
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:779:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					        atoi(row[0]));
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:822:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:863:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		result = atoi(row[0]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1051:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, root_data, root_size);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1055:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, parms, parms_size);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1122:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query,
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1145:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int dc_idx = atoi(row[0]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1255:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "SELECT * FROM dbtRegisteredAgents WHERE ID=%d", id);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1324:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1329:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "SELECT TableName from lvtMessageTablesList WHERE ID=%d",
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1351:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(query, "SELECT TYPE FROM dbtMessagesControls where ID=%d",
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1381:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				type = atoi(entry_row[0]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1435:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1442:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "SELECT * FROM dbtMessagesControls WHERE ID=%d", id);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1463:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int type = atoi(row[1]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1475:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			Lyst contents = db_fetch_mid_col(atoi(row[6]));
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1532:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1538:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "INSERT INTO dbtIncoming(ReceivedTS,GeneratedTS,State) "
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1549:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "SELECT LAST_INSERT_ID() FROM dbtIncoming");
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1568:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    	result = atoi(row[0]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1597:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1600:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query,"UPDATE dbtIncoming SET State = State + 1 WHERE ID = %d", id);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1954:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[128];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1962:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		idx = atoi(row[0]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2061:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(query, "UPDATE dbtOutgoing SET State=2 WHERE ID=%d", idx);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2110:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "SELECT * FROM dbtOutgoingMessages WHERE OutgoingID=%d",
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2126:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int table_idx = atoi(row[2]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2127:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int entry_idx = atoi(row[3]);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2349:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2358:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "SELECT AgentID FROM dbtOutgoingRecipients "
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2385:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if((reg_agent = db_fetch_reg_agent(atoi(row[0]))) != NULL)
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2451:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(query, "SELECT * FROM dbtOutgoing WHERE State=%d", TX_READY);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[10];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:266:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:268:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mid_str[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:333:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mid_str[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:400:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:404:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mid_str[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:475:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:476:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mid_str[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:552:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:553:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mid_str[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:619:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mid_str[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:620:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:677:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MAX_EID_LEN];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:717:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MAX_EID_LEN];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:759:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char choice[3];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:969:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:997:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&(result->issuer), data, 4);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:1051:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&(result->tag), data, 4);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:1107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256];
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:1193:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if((cur_mid_idx = atoi(cur_mid)) <= max_idx)
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:1776:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char tmp_oid[8] = {0x07,0x01,0x02,0x03,0x04,0x05,0x06,0x00};
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:394:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, &flag, 1);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:397:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, len.text, len.length);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:400:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, tmp, nn_size);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:403:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, off.text, off.length);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:463:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result, value, size);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:496:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result, value, size);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1063:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor,"("UVAST_FIELDSPEC"): ",num);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1145:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&temp, buffer, data_len);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1219:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor,"("UVAST_FIELDSPEC"): ",num);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1226:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		cursor += sprintf(cursor, "%ld, ",val);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1300:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&temp, buffer, data_len);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.h:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[ADM_MAX_NAME];     /**> Name of this MIB item                */
data/ion-3.2.1+dfsg/nm/shared/adm/adm.h:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[ADM_MAX_NAME];
data/ion-3.2.1+dfsg/nm/shared/adm/adm_agent.c:125:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&state, buffer, data_len);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_agent.c:142:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(result,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[256];
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:351:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[256];
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:354:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&endpoint, buffer, data_len);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:165:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&state, buffer, data_len);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:182:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(result,
data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:199:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&induct, buffer, data_len);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:237:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&outduct, buffer, data_len);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_ltp.c:190:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(result,
data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:90:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, id.text, id.length);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:93:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, msg->agent_id.name, id_len);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:164:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, &(msg->mask),1);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:265:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,code,code_size);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:269:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, time.text, time.length);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:272:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, list, list_size);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:369:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result->agent_id.name,cursor,sdnv_tmp);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:102:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,time_sdnv.text,time_sdnv.length);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:105:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,period_sdnv.text,period_sdnv.length);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:108:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,count_sdnv.text,count_sdnv.length);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:111:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, contents, contents_len);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:187:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,time_sdnv.text,time_sdnv.length);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:190:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, contents, contents_len);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_def.c:112:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, id, id_len);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_def.c:116:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, contents, contents_len);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:101:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, contents, contents_len);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:181:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,id,id_len);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:185:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,size.text, size.length);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:188:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,entry->contents,entry->size);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:332:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,time.text, time.length);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:335:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, num_rpts_sdnv.text, num_rpts_sdnv.length);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:340:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor,temp_space[i], temp_len[i]);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:592:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cur_entry->contents, cursor, cur_entry->size);
data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:346:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,hdr,hdr_len);
data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:350:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,msg->contents, msg->size);
data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:355:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, acl, acl_len);
data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:494:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, num_msgs_sdnv.text, num_msgs_sdnv.length);
data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:497:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, time_sdnv.text, time_sdnv.length);
data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:502:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, tmp_data[i], tmp_size[i]);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:350:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result, src_mid, sizeof(mid_t));
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:367:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result->raw, src_mid->raw, src_mid->raw_size);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:560:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result->raw, buffer, *bytes_used);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:682:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, iss.text, iss.length);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:687:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,oid_val, oid_size);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:693:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, tag.text, tag.length);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:849:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor,"MID:\n---------------------\nFlag: %#x",mid->flags);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:851:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor,"\nType : ");
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:854:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 0: cursor += sprintf(cursor,"DATA\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:855:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 1: cursor += sprintf(cursor,"CONTROL\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:856:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 2: cursor += sprintf(cursor,"LITERAL\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:857:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 3: cursor += sprintf(cursor,"OPERATOR\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:858:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	default: cursor += sprintf(cursor,"UNKNOWN\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:861:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor,"Cat: ");
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:864:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 0: cursor += sprintf(cursor,"ATOMIC\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:865:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 1: cursor += sprintf(cursor,"COMPUTED\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:866:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 2: cursor += sprintf(cursor,"COLLECTION\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:867:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	default: cursor += sprintf(cursor,"UNKNOWN\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:876:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		cursor += sprintf(cursor,"None.\n");
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:888:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		cursor += sprintf(cursor,"None.\n");
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1088:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result, mid->raw, mid->raw_size);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1457:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor,"MID COLLECTION:\n-------------\n");
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1463:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor,"--------------\n");
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1577:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor,"MC : ");
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1583:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor,".\n");
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1693:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cursor, num_sdnv.text, num_sdnv.length);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1704:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    			memcpy(cursor,cur_mid->raw, cur_mid->raw_size);
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:147:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor, value, len);
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:414:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result->value, src_oid->value, result->value_size);
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:741:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(new_oid->value[1]), cursor, oid_size);
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:946:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor,"OID:\n---------------------\nType: ");
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:950:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 0: cursor += sprintf(cursor,"FULL\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:951:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 1: cursor += sprintf(cursor,"PARAM\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:952:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 2: cursor += sprintf(cursor,"COMP_FULL\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:953:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 3: cursor += sprintf(cursor,"COMP_PARAM\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:954:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	default: cursor += sprintf(cursor,"UNKNOWN\n"); break;
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:957:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor,"num_parm: %ld\n", lyst_length(oid->params));
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:969:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cursor += sprintf(cursor, "nn_id: %d\n", (uint32_t)oid->nn_id);
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:1192:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, nn_sdnv.text, nn_sdnv.length);
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:1197:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cursor,oid->value, oid->value_size);
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:1213:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor, parms, parm_size);
data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:1347:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_nn, nn, sizeof(oid_nn_t));
data/ion-3.2.1+dfsg/nm/shared/utils/nm_types.h:30:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_EID_LEN];
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:284:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_entry->value, cur_entry->value, new_entry->length);
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:409:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(entry->value, cursor, entry->length);
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:564:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cursor, num_sdnv.text, num_sdnv.length);
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:574:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    		memcpy(cursor, tmp.text, tmp.length);
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:577:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    		memcpy(cursor,entry->value, entry->length);
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:732:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp[3];
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:759:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(temp, "%.2x", (unsigned int)buffer[i]);
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:828:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp_s[3];
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:886:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp_s, &(value[i]), 2);
data/ion-3.2.1+dfsg/tests/1000.loopback/dotest.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rxContent[sizeof(testLine)];
data/ion-3.2.1+dfsg/tests/1300.loopback-tcp/dotest.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rxContent[sizeof(testLine)];
data/ion-3.2.1+dfsg/tests/1400.loopback-stcp/dotest.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rxContent[sizeof(testLine)];
data/ion-3.2.1+dfsg/tests/1500.loopback-brs/dotest.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rxContent[sizeof(testLine)];
data/ion-3.2.1+dfsg/tests/1500.loopback-brs/dotest.c:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char key[20];
data/ion-3.2.1+dfsg/tests/issue-330-cfdpclock-FDU-removal/cfdplisten.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				sourceFileNameBuf[256];
data/ion-3.2.1+dfsg/tests/issue-330-cfdpclock-FDU-removal/cfdplisten.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				destFileNameBuf[256];
data/ion-3.2.1+dfsg/tests/issue-330-cfdpclock-FDU-removal/cfdplisten.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				statusReportBuf[256];
data/ion-3.2.1+dfsg/tests/issue-330-cfdpclock-FDU-removal/cfdplisten.c:64:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		usrmsgBuf[256];
data/ion-3.2.1+dfsg/tests/issue-333-cfdp-orig-ID-type/send.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			sourceFileNameBuf[256];
data/ion-3.2.1+dfsg/tests/issue-333-cfdp-orig-ID-type/send.c:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			destFileNameBuf[256];
data/ion-3.2.1+dfsg/tests/issue-333-cfdp-orig-ID-type/send.c:48:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(parms.destFileNameBuf, "../rcvfile");
data/ion-3.2.1+dfsg/tests/issue-333-cfdp-orig-ID-type/send.c:50:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(parms.sourceFileNameBuf, "../dotest");
data/ion-3.2.1+dfsg/tests/issue-334-cfdp-transaction-id/dotest.c:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			sourceFileNameBuf[256];
data/ion-3.2.1+dfsg/tests/issue-334-cfdp-transaction-id/dotest.c:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			destFileNameBuf[256];
data/ion-3.2.1+dfsg/tests/issue-334-cfdp-transaction-id/dotest.c:55:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(parms.sourceFileNameBuf, "dotest.c");
data/ion-3.2.1+dfsg/tests/issue-334-cfdp-transaction-id/dotest.c:56:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(parms.destFileNameBuf, "testfile");
data/ion-3.2.1+dfsg/tests/library/ionstart.c:15:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 	char	cmdline[256];
data/ion-3.2.1+dfsg/tests/library/paths.c:13:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char path_prefix[256] = "";
data/ion-3.2.1+dfsg/tests/library/paths.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefixedFileName[PATHLENMAX];
data/ion-3.2.1+dfsg/ams/library/amscommon.c:511:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(pubkeyname) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:519:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(privkeyname) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:767:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int		length = strlen(name);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1085:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	|| strlen(*gwEid) > MAX_GW_EID)		/*	Invalid.	*/
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1133:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(name);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1146:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(description) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1154:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(symmetricKeyName) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1162:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(marshalFnName) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1170:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(unmarshalFnName) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1199:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(name);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1211:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(publicKeyName) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1219:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(privateKeyName) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1322:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(roleName);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1367:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(name);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1378:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(publicKeyName) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1386:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(privateKeyName) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1428:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(gwEid) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1434:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(symmetricKeyName) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1572:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namelen = strlen(name);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1668:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(authname);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1789:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(name);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1802:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		descLen = strlen(description) + 1;
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1842:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(endpointName);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:1881:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(epspec) > MAX_EP_SPEC)
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2092:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		authNameLen = strlen(authName);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2399:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		authNameLen = strlen(authName);
data/ion-3.2.1+dfsg/ams/library/amscommon.c:2470:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		textLength = strlen(text);
data/ion-3.2.1+dfsg/ams/library/amsd.c:394:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		supplementLength = 2 + strlen(ept) + 1;
data/ion-3.2.1+dfsg/ams/library/amsd.c:428:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cellspecLength = 2 + strlen(ept) + 1;
data/ion-3.2.1+dfsg/ams/library/amsd.c:505:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		supplementLength = 2 + strlen(ept) + 1;
data/ion-3.2.1+dfsg/ams/library/amsd.c:1020:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			supplementLen = strlen(rsState->tsif.ept) + 1;
data/ion-3.2.1+dfsg/ams/library/dgrts.c:87:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eptLen = strlen(endpointNameText) + 1;
data/ion-3.2.1+dfsg/ams/library/dgrts.c:196:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eptLen = strlen(endpointNameText) + 1;
data/ion-3.2.1+dfsg/ams/library/libams.c:193:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		textLength = strlen(text);
data/ion-3.2.1+dfsg/ams/library/libams.c:1156:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length += (strlen(sap->mamsTsif.ept) + 1);
data/ion-3.2.1+dfsg/ams/library/libams.c:1171:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			length += (strlen(tsif->ts->name)
data/ion-3.2.1+dfsg/ams/library/libams.c:1172:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					+ 1 + strlen(tsif->ept) + 1);
data/ion-3.2.1+dfsg/ams/library/libams.c:1192:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cursor += (strlen(cursor) + 1);
data/ion-3.2.1+dfsg/ams/library/libams.c:1210:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(tsif->ts->name);
data/ion-3.2.1+dfsg/ams/library/libams.c:1215:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(tsif->ept);
data/ion-3.2.1+dfsg/ams/library/libams.c:2920:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eptLen = strlen(ept) + 1;
data/ion-3.2.1+dfsg/ams/library/libams.c:3284:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int	eptLength = strlen(ept) + 1;
data/ion-3.2.1+dfsg/ams/library/libams.c:3704:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(applicationName);
data/ion-3.2.1+dfsg/ams/library/libams.c:3707:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(authorityName);
data/ion-3.2.1+dfsg/ams/library/libams.c:3710:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(unitName);
data/ion-3.2.1+dfsg/ams/library/libams.c:3712:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(roleName);
data/ion-3.2.1+dfsg/ams/library/loadmib.c:1583:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		length = read(sourceFile, buf, sizeof(buf));
data/ion-3.2.1+dfsg/ams/library/tcpts.c:330:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eptLen = strlen(endpointNameText) + 1;
data/ion-3.2.1+dfsg/ams/library/udpts.c:118:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eptLen = strlen(endpointNameText) + 1;
data/ion-3.2.1+dfsg/ams/library/udpts.c:257:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eptLen = strlen(endpointNameText) + 1;
data/ion-3.2.1+dfsg/ams/library/vmqts.c:89:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eptLen = strlen(endpointNameText) + 1;
data/ion-3.2.1+dfsg/ams/rams/librams.c:214:7:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		if (sscanf(buffer, "%u %255s %u %d %u %u %u",
data/ion-3.2.1+dfsg/ams/rams/librams.c:283:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(logLine);
data/ion-3.2.1+dfsg/ams/test/amshello.c:47:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	textlen = strlen(buffer) + 1;
data/ion-3.2.1+dfsg/ams/test/amslog.c:113:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	subjectNameLength = strlen(subjectName);
data/ion-3.2.1+dfsg/ams/test/amslog.c:166:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		replyLength = strlen(replyText);
data/ion-3.2.1+dfsg/ams/test/amslog.c:295:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		stringLength = strlen(cmdString);
data/ion-3.2.1+dfsg/ams/test/amslog.c:311:15:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		parmCount = sscanf(cmdString, "%32s %32s %32s %32s",
data/ion-3.2.1+dfsg/ams/test/amspubsub.c:117:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (ams_publish(me, subjectNbr, 0, 0, strlen(msgText) + 1, msgText, 0)
data/ion-3.2.1+dfsg/ams/test/amsshell.c:117:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	newline = line + strlen(line) - 1;
data/ion-3.2.1+dfsg/ams/test/amsshell.c:155:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			contentLength = strlen(content) + 1;
data/ion-3.2.1+dfsg/ams/test/amsshell.c:163:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		subjectNameLength = strlen(subjectNameString);
data/ion-3.2.1+dfsg/ams/test/amsshell.c:176:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		contentLength = strlen(content) + 1;
data/ion-3.2.1+dfsg/ams/test/amsshell.c:179:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(subjectName) == 0)
data/ion-3.2.1+dfsg/ams/utils/amsmib.c:104:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	result = read(fd, content, contentLength);
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:105:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(parmToken) >= SDRSTRING_BUFSZ)
data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:148:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(destDuctName) >= SDRSTRING_BUFSZ)
data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c:48:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nssLength = strlen(nss);
data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c:77:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(startOfDemux) >= SDRSTRING_BUFSZ)
data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:131:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int	nameLength = strlen(inputNodeName);
data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c:790:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	CHKERR(strlen(viaEid) <= MAX_SDRSTRING);
data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c:841:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	CHKERR(strlen(viaEid) <= MAX_SDRSTRING);
data/ion-3.2.1+dfsg/bp/library/acs/acsid.c:51:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(bid.sourceEid, sourceEid, MAX_EID_LEN);
data/ion-3.2.1+dfsg/bp/library/acs/acsid.c:268:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(bid.sourceEid, sourceEid, MAX_EID_LEN);
data/ion-3.2.1+dfsg/bp/library/acs/acstx.c:599:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(newCustodian.eid, eid, MAX_EID_LEN);
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1019:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memcpy(srcNode, tmp2, strlen(tmp2));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1023:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memcpy(destNode, ctxt->proxNodeEid, strlen(ctxt->proxNodeEid));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1035:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  memcpy(srcNode, tmp2, strlen(tmp2));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1046:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          memcpy(srcNode, tmp2, strlen(tmp2));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1058:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memcpy(destNode, tmp2, strlen(tmp2));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1077:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memcpy(tmp2, srcNode, strlen(srcNode));
data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1084:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memcpy(tmp2, destNode, strlen(destNode));
data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:162:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	custodianEidLen = strlen(custodianEid);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:1942:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bpString->textLength = strlen(string);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2011:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(eidString) == 8 && strcmp(eidString, _nullEid()) == 0)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2038:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	metaEid->nssLength = strlen(metaEid->nss);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2132:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	schemeNameLength = strlen(dictionary + eid->schemeNameOffset);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2133:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nssLength = strlen(dictionary + eid->nssOffset);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2761:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen(buffer);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2971:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(fwdCmd) > MAX_SDRSTRING)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:2988:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(admAppCmd) > MAX_SDRSTRING)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:3215:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(metaEid.nss) > MAX_NSS_LEN)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:3450:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	|| strlen(protocolName) > MAX_CL_PROTOCOL_NAME_LEN)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:3678:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(ductName) > MAX_CL_DUCT_NAME_LEN)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:3684:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(cliCmd) > MAX_SDRSTRING)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:3762:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(cliCmd) > MAX_SDRSTRING)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:3937:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(ductName) > MAX_CL_DUCT_NAME_LEN)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:3951:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(cloCmd) > MAX_SDRSTRING)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:4058:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(cloCmd) > MAX_SDRSTRING)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:4799:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(eid) >= SDRSTRING_BUFSZ)
data/ion-3.2.1+dfsg/bp/library/libbpP.c:6366:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		eidLen = strlen(senderEid) + 1;
data/ion-3.2.1+dfsg/bp/library/libbpP.c:6881:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nullEidLen = strlen(_nullEid());
data/ion-3.2.1+dfsg/bp/library/libbpP.c:7913:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eidLength = strlen(csig->sourceEid);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8144:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eidLength = strlen(rpt->sourceEid);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8785:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	stringLength = strlen(string);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8790:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	stringLength = strlen(string);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8795:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	stringLength = strlen(string);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8800:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	stringLength = strlen(string);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8805:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	stringLength = strlen(string);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:8810:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	stringLength = strlen(string);
data/ion-3.2.1+dfsg/bp/library/libbpP.c:9098:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	CHKERR(*proxNodeEid && strlen(proxNodeEid) < MAX_SDRSTRING);
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:798:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	adminEidStringLen = strlen(hostNameBuf) + 11;
data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:803:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	adminEidLength = strlen(adminEidString);
data/ion-3.2.1+dfsg/bp/test/bpchat.c:44:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		lineLength = strlen(lineBuffer);
data/ion-3.2.1+dfsg/bp/test/bping.c:176:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(respSrcEid, dlv.bundleSourceEid, 63);
data/ion-3.2.1+dfsg/bp/test/bping.c:356:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(interval * 1e6);
data/ion-3.2.1+dfsg/bp/test/bping.c:372:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(myflags, flags, 1023);
data/ion-3.2.1+dfsg/bp/test/bpsource.c:123:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		lineLength = strlen(text);
data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:196:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lineLength = strlen(line);
data/ion-3.2.1+dfsg/bp/utils/bplist.c:30:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(cursor) + 1;
data/ion-3.2.1+dfsg/bp/utils/bptrace.c:150:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int		msgLength = strlen(trace) + 1;
data/ion-3.2.1+dfsg/bss/library/libbssP.c:221:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(fd, (char *) index, sizeof(tblIndex)) < 0)
data/ion-3.2.1+dfsg/bss/library/libbssP.c:256:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    (read(fileD, entry, sizeof(lstEntry)) < 0))
data/ion-3.2.1+dfsg/bss/library/libbssP.c:375:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    (read(fileD, rec, sizeof(dataRecord)) < 0))
data/ion-3.2.1+dfsg/bss/library/libbssP.c:387:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(fileD, buffer, length*sizeof(char)) < 0)
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:191:6:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	if (sscanf(parameters, "%63s %255s %31s", bssName, path, eid) != 3)
data/ion-3.2.1+dfsg/bss/test/bssrecv.c:380:10:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
					if (sscanf(menuNav, "%19s %19s", fromTime, toTime) != 2)
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:956:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(bsoBECmd) > MAX_SDRSTRING )
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:963:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(bsoRLCmd) > MAX_SDRSTRING )
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1054:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(bsoBECmd) > MAX_SDRSTRING)
data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1073:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(bsoRLCmd) > MAX_SDRSTRING)
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:153:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	length = read(fd, defaultReaderBuf, cfdpConstants->maxFileDataLength);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:186:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	length = read(fd, pktReaderBuf, cfdpConstants->maxFileDataLength);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:274:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	length = read(fd, textReaderBuf, cfdpConstants->maxFileDataLength);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:455:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	CHKERR(firstFileName == NULL || strlen(firstFileName) < 256);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:456:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	CHKERR(secondFileName == NULL || strlen(secondFileName) < 256);
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:755:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = (sourceFileName == NULL ? 0 : strlen(sourceFileName));
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:768:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = (destFileName == NULL ? 0 : strlen(destFileName));
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1138:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(sourceFileName) >= 256)
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1146:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(destFileName) >= 256)
data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1963:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	length = read(fd, buffer, length);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:905:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	CHKERR(firstFileName == NULL || strlen(firstFileName) < 256);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:906:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	CHKERR(secondFileName == NULL || strlen(secondFileName) < 256);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:907:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	CHKERR(message == NULL || strlen(secondFileName) < 256);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1542:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		length = read(sourceFd, buf, 10000);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1844:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(msgBuf) > 0)
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:639:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sourceFileNameLen = strlen(task->sourceFileName);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:647:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			destFileNameLen = strlen(task->destFileName);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1122:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int			dirNameLen = strlen(opsData->directoryName);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1124:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(opsData->directoryDestFileName);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1170:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(opsData->directoryName) == 0
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1171:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	|| strlen(opsData->directoryDestFileName) == 0)
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1205:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write(listing, listingLine, strlen(listingLine) + 1) < 0)
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1237:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	directoryNameLen = strlen(task->directoryName);
data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1239:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	destFileNameLen = strlen(task->destFileName);
data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:330:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(tokens[1]) + 1));
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:405:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (hndl=0; hndl < NUM_TMP_FILES && strlen(tmp_files[hndl]); hndl++)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:410:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (hndl > TMP_MAX || hndl >= NUM_TMP_FILES || strlen(tmp_files[hndl]))
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:416:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	oK(umask(S_IWGRP | S_IWOTH));
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:426:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(tmp_files[hndl], tmp, 255);
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:432:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(tmp) + strlen(dir) + strlen("cfdp")+ 1 >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:432:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(tmp) + strlen(dir) + strlen("cfdp")+ 1 >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:432:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(tmp) + strlen(dir) + strlen("cfdp")+ 1 >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:521:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if(read(fd, &c, 1)<=0){
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:540:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if(read(fd, &c, 1)<=0){
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:561:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(buf)==0)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:826:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(t->sfile) + strlen(t->dfile) +strlen("cfdp")+ 10 >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:826:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(t->sfile) + strlen(t->dfile) +strlen("cfdp")+ 10 >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:826:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(t->sfile) + strlen(t->dfile) +strlen("cfdp")+ 10 >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:923:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(t->sfile) + strlen(t->dfile) + strlen("cfdp")+ 10 >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:923:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(t->sfile) + strlen(t->dfile) + strlen("cfdp")+ 10 >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:923:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(t->sfile) + strlen(t->dfile) + strlen("cfdp")+ 10 >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1109:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (t->sfile[strlen(t->sfile)-1]=='/')
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1111:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		t->sfile[strlen(t->sfile)-1]=0;
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1113:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (t->dfile[strlen(t->dfile)-1]=='/')
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1115:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		t->dfile[strlen(t->dfile)-1]=0;
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1146:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (strlen(t->sfile) + 1 + _D_EXACT_NAMLEN(dp) >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1207:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (strlen(t->sfile) + 1 + strlen(buff) >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1207:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (strlen(t->sfile) + 1 + strlen(buff) >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1285:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(t->dfile) + 1 + strlen(cwd+1) >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1285:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(t->dfile) + 1 + strlen(cwd+1) >= 255)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1603:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(t->shost)==0)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1614:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(t->dhost)==0)
data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:108:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define _D_EXACT_NAMLEN(d) (strlen ((d)->d_name))
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:33:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(dtn_eid.uri, endpoint_id.uri, DTN_MAX_ENDPOINT_ID);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:39:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(bp_eid.uri, endpoint_id.uri, AL_BP_MAX_ENDPOINT_ID);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:105:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(dtn_reginfo.script.script_val, reg_info.script.script_val, reg_info.script.script_len + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:128:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(bp_reginfo.script.script_val, reg_info.script.script_val, reg_info.script.script_len + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:338:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(dtn_bundle_payload.filename.filename_val, bundle_payload.filename.filename_val, bundle_payload.filename.filename_len + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:375:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(bp_bundle_payload.filename.filename_val, bundle_payload.filename.filename_val, bundle_payload.filename.filename_len + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:189:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		strncpy(schemeName,"ipn",4);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:191:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		strncpy(schemeName,"dtn",4);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:334:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * tmp_eid = (char *) malloc(sizeof(char) * (strlen(dlv.bundleSourceEid)+1));
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:396:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(ion_src)+1;
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:398:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(ion_dst,ion_src,length);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:411:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(endpoint,str,strlen(str)+1);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:411:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strncpy(endpoint,str,strlen(str)+1);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:34:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int length_eid = strlen(endpoint_id.uri)+1;
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:36:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(eid_ion,endpoint_id.uri,length_eid);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:42:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int length = strlen(endpoint_id)+1;
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:43:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(eid_bp.uri,endpoint_id,length);
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:286:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		payload.filename.filename_len = strlen(filename)+1;
data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:287:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		payload.filename.filename_val = (char *)malloc(sizeof(char)*(strlen(filename)+1));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:361:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eid_len = strlen(opt->mon_eid);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:495:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	monitor_eid_len = strlen(opt->mon_eid);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:502:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i = remaining; i > strlen(pattern); i -= strlen(pattern))
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:502:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i = remaining; i > strlen(pattern); i -= strlen(pattern))
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:504:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fwrite(pattern, strlen(pattern), 1, f);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:505:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*bytes_written+=strlen(pattern);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:507:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*crc = calc_crc32_d8(*crc, (uint8_t*) pattern, strlen(pattern));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:509:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fwrite(pattern, remaining % strlen(pattern), 1, f);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:510:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*bytes_written+=remaining%strlen(pattern);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:512:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*crc = calc_crc32_d8(*crc, (uint8_t*) pattern, remaining % strlen(pattern));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:595:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eid_len = strlen(ack.bundle_source.uri);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:692:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(ext_block->block.data.data_val, buf, len);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:25:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fwrite(buf, strlen(buf), 1, file);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:32:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fwrite(buf, strlen(buf), 1, file);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:39:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fwrite(buf, strlen(buf), 1, file);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:58:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fwrite(buf, strlen(buf), 1, file);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:107:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(buf1, ";");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:109:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fwrite(buf1, strlen(buf1), 1, file);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:131:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (buf[strlen(buf) -1] != ';')
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:132:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(buf, ";");
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:133:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fwrite(buf, strlen(buf), 1, file);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:188:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	client_demux_string = malloc (strlen(CLI_EP_STRING) + 10);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:227:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(perf_opt->mon_eid) == 0)
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:235:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(perf_opt->mon_eid, local_eid.uri, ptr - local_eid.uri);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:245:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(perf_opt->mon_eid, temp, strlen(temp));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:245:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strncpy(perf_opt->mon_eid, temp, strlen(temp));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:354:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		header_size = get_header_size(perf_opt->op_mode, strlen(perf_opt->F_arg), strlen(perf_opt->mon_eid) );
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:354:77:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		header_size = get_header_size(perf_opt->op_mode, strlen(perf_opt->F_arg), strlen(perf_opt->mon_eid) );
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:356:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		header_size = get_header_size(perf_opt->op_mode, 0, strlen(perf_opt->mon_eid) );
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:479:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			transfer_filename = malloc(strlen(temp2) + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:483:101:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tot_bundles += bundles_needed(transfer_filedim, get_file_fragment_size(perf_opt->bundle_payload, strlen(transfer_filename), strlen(perf_opt->mon_eid)));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:483:128:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tot_bundles += bundles_needed(transfer_filedim, get_file_fragment_size(perf_opt->bundle_payload, strlen(transfer_filename), strlen(perf_opt->mon_eid)));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:772:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					tmp_payload.filename.filename_len = strlen(file_bundle_names[i]);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:864:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		error = al_bp_bundle_set_payload_file(&bundle, source_file, strlen(source_file));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1030:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				error = al_bp_bundle_set_payload_file(&bundle, source_file, strlen(source_file));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1630:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(perf_opt->dest_eid, optarg, AL_BP_MAX_ENDPOINT_ID);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1634:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(perf_opt->mon_eid, optarg, AL_BP_MAX_ENDPOINT_ID);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1924:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						block_buf, strlen(block_buf));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:101:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	command = malloc(sizeof(char) * (10 + strlen(perf_opt->logs_dir)));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:402:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					filename_len = strlen(relative_source_addr.uri) - strlen("ipn:") + 15;
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:402:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					filename_len = strlen(relative_source_addr.uri) - strlen("ipn:") + 15;
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:406:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					filename_len = strlen(relative_source_addr.uri) - strlen("dtn://") + 15;
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:406:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					filename_len = strlen(relative_source_addr.uri) - strlen("dtn://") + 15;
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:411:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(temp, relative_source_addr.uri, strlen(relative_source_addr.uri) + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:411:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strncpy(temp, relative_source_addr.uri, strlen(relative_source_addr.uri) + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:429:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				full_filename = (char *) malloc(strlen(perf_opt->logs_dir) + strlen(filename) + 2);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:429:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				full_filename = (char *) malloc(strlen(perf_opt->logs_dir) + strlen(filename) + 2);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:147:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	command = malloc(sizeof(char) * (10 + strlen(perf_opt->dest_dir)));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:168:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	command = malloc(sizeof(char) * (10 + strlen(perf_opt->file_dir)));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:679:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					tmp_eid = (char *) malloc(sizeof(char) * strlen(bundle_source_addr.uri)+1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:694:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					filename_ack_len = strlen(filename_ack)+1;
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:894:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				char* filename = (char*) malloc(item->info->filename_len + strlen(item->info->full_dir) +1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1148:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char* filename = (char*) malloc(item->info->filename_len + strlen(item->info->full_dir) +1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:55:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->full_dir = (char*) malloc(strlen(full_dir) + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:56:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(info->full_dir, full_dir, strlen(full_dir) + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:56:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strncpy(info->full_dir, full_dir, strlen(full_dir) + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:58:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(info->filename, filename, filename_len +1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:185:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char* filename = (char*) malloc(info->filename_len + strlen(info->full_dir) +1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:270:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(temp, client_eid.uri, strlen(client_eid.uri) + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:270:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strncpy(temp, client_eid.uri, strlen(client_eid.uri) + 1);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:282:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		full_dir = (char*) malloc(strlen(dir) + strlen(eid) + 20);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:282:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		full_dir = (char*) malloc(strlen(dir) + strlen(eid) + 20);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:301:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fseek(pl_stream, sizeof(filename_len) + strlen(info->filename), SEEK_CUR);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:349:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	uint16_t filename_len = strlen(filename);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:350:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	uint16_t monitor_eid_len = strlen(opt->mon_eid);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:360:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bytes_read = read(fd, fragment, fragment_len);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:306:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    k = strlen(s) - 1;
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:307:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp = malloc(strlen(s));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:321:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (k != (int)strlen(temp))
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:379:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(cmd_exe, cmd_args, strlen(cmd_args));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:379:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strncat(cmd_exe, cmd_args, strlen(cmd_args));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:385:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		item_len = strlen(item->d_name);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:403:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		length = read(fd, buf, sizeof(buf));
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:438:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
		strncat(cmdline_exe, cmdline_args, sizeof(cmdline_exe) - strlen(cmdline_exe) - 2);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:438:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strncat(cmdline_exe, cmdline_args, sizeof(cmdline_exe) - strlen(cmdline_exe) - 2);
data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:440:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(cmdline_exe, cmd_exe, strlen(cmd_exe)) == 0)
data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:128:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eofLineLen = strlen(eofLine);
data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:180:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		lineLen = strlen(line);
data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:235:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eofLineLen = strlen(eofLine);
data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:280:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		lineLen = strlen(line);
data/ion-3.2.1+dfsg/dgr/test/file2udp.c:425:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	eofLineLen = strlen(eofLine);
data/ion-3.2.1+dfsg/dgr/test/file2udp.c:461:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		lineLen = strlen(line);
data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:31:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bytesRead = read(*sock, into, length);
data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:671:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(dstEid) == 8 && strcmp(dstEid, "dtn:none") == 0)
data/ion-3.2.1+dfsg/ici/library/ion.c:358:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	textLen = strlen(msgbuf);
data/ion-3.2.1+dfsg/ici/library/ionsec.c:89:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/library/ionsec.c:89:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/library/ionsec.c:91:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/library/ionsec.c:91:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/library/ionsec.c:1415:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bytesRead = read(keyfd, cursor, length);
data/ion-3.2.1+dfsg/ici/library/ionsec.c:1783:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (eidsMatch(eidBuffer, eidLen, destEid, strlen(destEid)))
data/ion-3.2.1+dfsg/ici/library/ionsec.c:1789:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(srcEid)))
data/ion-3.2.1+dfsg/ici/library/ionsec.c:1928:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(keyName) > 31)
data/ion-3.2.1+dfsg/ici/library/ionsec.c:2052:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(secDestEid))))
data/ion-3.2.1+dfsg/ici/library/ionsec.c:2058:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(secSrcEid)) == 1)
data/ion-3.2.1+dfsg/ici/library/ionsec.c:2295:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                strlen(secDestEid))))
data/ion-3.2.1+dfsg/ici/library/ionsec.c:2301:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        strlen(secSrcEid)) == 1)
data/ion-3.2.1+dfsg/ici/library/ionsec.c:2352:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(ciphersuiteName) > 31)
data/ion-3.2.1+dfsg/ici/library/ionsec.c:2358:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(keyName) > 31)
data/ion-3.2.1+dfsg/ici/library/ionsec.c:2420:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(ciphersuiteName) > 31)
data/ion-3.2.1+dfsg/ici/library/ionsec.c:2426:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(keyName) > 31)
data/ion-3.2.1+dfsg/ici/library/platform.c:337:7:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
void	*memalign(size_t boundary, size_t size)
data/ion-3.2.1+dfsg/ici/library/platform.c:588:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buffer, name.nodename, bufferLength - 1);
data/ion-3.2.1+dfsg/ici/library/platform.c:653:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buffer, hostInfo->h_name, MAXHOSTNAMELEN);
data/ion-3.2.1+dfsg/ici/library/platform.c:738:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buffer, hostInfo->h_name, MAXHOSTNAMELEN);
data/ion-3.2.1+dfsg/ici/library/platform.c:892:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buffer, hostInfo->h_name, MAXHOSTNAMELEN);
data/ion-3.2.1+dfsg/ici/library/platform.c:1044:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buffer, hostInfo->h_name, MAXHOSTNAMELEN);
data/ion-3.2.1+dfsg/ici/library/platform.c:1264:10:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
	block = memalign((size_t) (sizeof(void *)), size);
data/ion-3.2.1+dfsg/ici/library/platform.c:1414:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		msgLength = strlen(errmsgs);
data/ion-3.2.1+dfsg/ici/library/platform.c:1443:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	spaceForText = 8 + strlen(lineNbrBuffer) + 4 + strlen(fileName)
data/ion-3.2.1+dfsg/ici/library/platform.c:1443:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	spaceForText = 8 + strlen(lineNbrBuffer) + 4 + strlen(fileName)
data/ion-3.2.1+dfsg/ici/library/platform.c:1444:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			+ 2 + strlen(text);
data/ion-3.2.1+dfsg/ici/library/platform.c:1448:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		spaceNeeded += (2 + strlen(arg) + 1);
data/ion-3.2.1+dfsg/ici/library/platform.c:1508:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		textLength = strlen(text);
data/ion-3.2.1+dfsg/ici/library/platform.c:1510:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		maxTextLength = sizeof textBuffer - (2 + strlen(sysmsg) + 1);
data/ion-3.2.1+dfsg/ici/library/platform.c:2221:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(hostname) != 0)
data/ion-3.2.1+dfsg/ici/library/platform.c:2517:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				numLen = strlen(scratchpad);
data/ion-3.2.1+dfsg/ici/library/platform.c:2546:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					numLen = strlen(scratchpad);
data/ion-3.2.1+dfsg/ici/library/platform.c:2647:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			fieldLength = strlen(sval);
data/ion-3.2.1+dfsg/ici/library/platform.c:2716:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fieldLength = strlen(scratchpad);
data/ion-3.2.1+dfsg/ici/library/platform.c:3003:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		switch (read(fd, cursor, 1))
data/ion-3.2.1+dfsg/ici/library/platform.c:3079:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(string);
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:553:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		argLen = strlen(arg);
data/ion-3.2.1+dfsg/ici/library/platform_sm.c:3161:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(commandLine);
data/ion-3.2.1+dfsg/ici/library/psm.c:253:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(name) > 31)
data/ion-3.2.1+dfsg/ici/library/psm.c:514:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if (strlen(name) > 32)
data/ion-3.2.1+dfsg/ici/library/sptrace.c:70:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((nameLen = strlen(name)) < 1 || nameLen > 31)
data/ion-3.2.1+dfsg/ici/library/sptrace.c:163:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((nameLen = strlen(name)) < 1 || nameLen > 31)
data/ion-3.2.1+dfsg/ici/library/sptrace.c:239:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buflen = strlen(sourceFileName) + 1;
data/ion-3.2.1+dfsg/ici/library/sptrace.c:289:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buflen = strlen(msg) + 1;
data/ion-3.2.1+dfsg/ici/library/sptrace.c:418:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(buffer);
data/ion-3.2.1+dfsg/ici/library/sptrace.c:427:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(buffer);
data/ion-3.2.1+dfsg/ici/library/sptrace.c:438:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(buffer);
data/ion-3.2.1+dfsg/ici/library/sptrace.c:463:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(buffer);
data/ion-3.2.1+dfsg/ici/library/sptrace.c:474:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(buffer);
data/ion-3.2.1+dfsg/ici/library/zco.c:381:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pathLen = strlen(pathName);
data/ion-3.2.1+dfsg/ici/library/zco.c:402:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cwdLen = strlen(pathBuf);
data/ion-3.2.1+dfsg/ici/library/zco.c:421:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		scriptLen = strlen(cleanupScript);
data/ion-3.2.1+dfsg/ici/library/zco.c:496:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pathLen = strlen(pathName);
data/ion-3.2.1+dfsg/ici/library/zco.c:517:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cwdLen = strlen(pathBuf);
data/ion-3.2.1+dfsg/ici/library/zco.c:536:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		scriptLen = strlen(cleanupScript);
data/ion-3.2.1+dfsg/ici/library/zco.c:1559:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				bytesRead = read(fd, buffer, bytesAvbl);
data/ion-3.2.1+dfsg/ici/sdr/sdrcatlg.c:62:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (object == 0 || name == NULL || strlen(name) > MAX_SDR_NAME)
data/ion-3.2.1+dfsg/ici/sdr/sdrcatlg.c:139:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XNCHKZERO(!(name == NULL || strlen(name) > MAX_SDR_NAME));
data/ion-3.2.1+dfsg/ici/sdr/sdrstring.c:53:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (from == NULL || (length = strlen(from)) > 255)
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:596:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		|| read(logfile, (char *) logEntryControl, length) < length)
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:607:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (read(logfile, dbsm + logEntryControl[0], length)
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:643:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				if (read(logfile, buf, length) < length)
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:852:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		lengthRead = read(logfile, (char *) logEntryControl, length);
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1205:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				if (read(dbfile, dbsm, sdr->sdrSize)
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1242:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				if (read(dbfile, dbsm, sdr->sdrSize)
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1866:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				|| read(sdrv->dbfile, buffer, length) < length)
data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1968:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			|| read(sdrv->dbfile, into, length) < length)
data/ion-3.2.1+dfsg/ici/test/file2sm.c:107:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				lineLen = strlen(eofLine) + 1;
data/ion-3.2.1+dfsg/ici/test/file2sm.c:146:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		lineLen = strlen(line) + 1;
data/ion-3.2.1+dfsg/ici/test/owltsim.c:383:11:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		switch (fscanf(configFile, "%32s %32s %hu %255s %hu %hu %hu",
data/ion-3.2.1+dfsg/ici/test/owlttb.c:102:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bytesRead = read(sock, into, length);
data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:682:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(newAlarmScript) > 255)
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:211:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(cursor) != (datLen * 2))
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:693:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:693:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:695:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:695:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:711:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:711:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:713:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:713:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	isprintf(buf + strlen(buf), sizeof buf - strlen(buf),
data/ion-3.2.1+dfsg/ici/utils/killm.c:106:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(name) <= 13)
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:951:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(lsoCmd) > MAX_SDRSTRING)
data/ion-3.2.1+dfsg/ltp/library/libltpP.c:1058:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(lsoCmd) > MAX_SDRSTRING)
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:796:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			        strlen(ptrs[num-1]) +    /* length of last string */
data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:860:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		result.length = (uint64_t) strlen(endpoint.eid) + 1;
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:310:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		result.length = (uint64_t) strlen(induct.inductName) + 1;
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:540:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			        strlen(ptrs[num-1]) +   /* length of last string */
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:573:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			        strlen(ptrs[num-1]) +   /* length of last string */
data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:642:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		result.length = (uint64_t) strlen(outduct.outductName) + 1;
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr.c:359:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(agent->agent_eid.name, in_eid->name, MAX_EID_LEN);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1028:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(oid_root) + parms_size;
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1276:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(eid.name, row[1], MAX_EID_LEN);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1647:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	result_size = strlen(result_data);
data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:654:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    	size = strlen(mid_str);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:107:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(name) > ADM_MAX_NAME)
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:122:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy((char *)new_entry->name, name, ADM_MAX_NAME);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:251:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(name) > ADM_MAX_NAME)
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:266:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy((char *)new_entry->name, name, ADM_MAX_NAME);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:485:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(value) + 1;
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:665:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(memcmp(name, cur->name, strlen(cur->name)) == 0)
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:840:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(memcmp(name, cur->name, strlen(cur->name)) == 0)
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:968:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((char*) buffer);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1070:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buf_ptr += strlen((char*)buf_ptr) + 1;
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1341:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((char*) buffer);
data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1399:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmp = strlen((char *)cursor) + 1;
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:200:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:213:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:217:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:229:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:233:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:243:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:253:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:265:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:275:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:280:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:288:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:292:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:316:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:320:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:340:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(result,temp,256);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:204:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*str_len = (temp_size * 5) + (25 * 100) + strlen(induct.inductName);
data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:242:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*str_len = (temp_size * 5) + (25 * 100) + strlen(outduct.outductName);
data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:73:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int id_len = strlen(msg->agent_id.name);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:769:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		oid_size = strlen((char *)oid_str) + 1;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:774:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		oid_size = strlen("NULL_OID") + 1;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:778:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
			strncpy((char *)oid_str,"NULL OID",oid_size);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:793:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		raw_size = strlen("NO RAW!") + 1;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:797:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
			strncpy(raw_str,"NO RAW!", raw_size);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:811:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		raw_size = strlen((char*)raw_str) + 1;
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1429:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tot_size += strlen(mid_strs[i]);
data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1549:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tot_size += strlen(mid_strs[i]);
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:86:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(s) > (sizeof(unsigned long) * 2))
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:95:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for(i = strlen(s)-1; i >= 0; i--)
data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:847:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((char*)value);
data/ion-3.2.1+dfsg/tests/issue-279-bpMemo-timeline/driver.c:19:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int payloadSize = strlen(testLine) + 1;

ANALYSIS SUMMARY:

Hits = 2266
Lines analyzed = 199530 in approximately 4.68 seconds (42609 lines/second)
Physical Source Lines of Code (SLOC) = 141900
Hits@level = [0] 1123 [1] 425 [2] 1678 [3]  26 [4] 137 [5]   0
Hits@level+ = [0+] 3389 [1+] 2266 [2+] 1841 [3+] 163 [4+] 137 [5+]   0
Hits/KSLOC@level+ = [0+] 23.883 [1+] 15.969 [2+] 12.9739 [3+] 1.1487 [4+] 0.965469 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.