Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/linbox-1.6.3/benchmarks/BenchmarkFile.h
Examining data/linbox-1.6.3/benchmarks/CSValue.h
Examining data/linbox-1.6.3/benchmarks/benchmark-dense-solve.C
Examining data/linbox-1.6.3/benchmarks/benchmark-example.C
Examining data/linbox-1.6.3/benchmarks/benchmark-metadata.C
Examining data/linbox-1.6.3/benchmarks/benchmark-metadata.h
Examining data/linbox-1.6.3/benchmarks/benchmark-order-basis.C
Examining data/linbox-1.6.3/benchmarks/benchmark-solve-cra.C
Examining data/linbox-1.6.3/benchmarks/benchmark-utils.C
Examining data/linbox-1.6.3/benchmarks/benchmark-utils.h
Examining data/linbox-1.6.3/benchmarks/benchmark.C
Examining data/linbox-1.6.3/benchmarks/benchmark.h
Examining data/linbox-1.6.3/benchmarks/block-coppersmith-benchmark.C
Examining data/linbox-1.6.3/benchmarks/gen-blocks.C
Examining data/linbox-1.6.3/benchmarks/invariant-factors-benchmark.C
Examining data/linbox-1.6.3/benchmarks/omp-benchmark.C
Examining data/linbox-1.6.3/benchmarks/optimizer.h
Examining data/linbox-1.6.3/examples/athadet.C
Examining data/linbox-1.6.3/examples/bench-fft.C
Examining data/linbox-1.6.3/examples/bench-matpoly-mult.C
Examining data/linbox-1.6.3/examples/bench-new-fft.C
Examining data/linbox-1.6.3/examples/bigmat.C
Examining data/linbox-1.6.3/examples/blackbox/ex-mat0.C
Examining data/linbox-1.6.3/examples/blackbox/example.C
Examining data/linbox-1.6.3/examples/blackbox/load-det.C
Examining data/linbox-1.6.3/examples/blackbox/load-minpoly.C
Examining data/linbox-1.6.3/examples/blackbox/load-symmetrize.C
Examining data/linbox-1.6.3/examples/blackbox/random-rank.C
Examining data/linbox-1.6.3/examples/blackbox/smith.C
Examining data/linbox-1.6.3/examples/blassolve.C
Examining data/linbox-1.6.3/examples/charpoly.C
Examining data/linbox-1.6.3/examples/checksolve.C
Examining data/linbox-1.6.3/examples/det.C
Examining data/linbox-1.6.3/examples/dot-product.C
Examining data/linbox-1.6.3/examples/doubledet.C
Examining data/linbox-1.6.3/examples/echelon.C
Examining data/linbox-1.6.3/examples/fields/ex-fields-archetype.C
Examining data/linbox-1.6.3/examples/fields/ex-fields.C
Examining data/linbox-1.6.3/examples/fields/modular-int.C
Examining data/linbox-1.6.3/examples/find-invariant-factors.C
Examining data/linbox-1.6.3/examples/genprime.C
Examining data/linbox-1.6.3/examples/gf3-invariant-factors.C
Examining data/linbox-1.6.3/examples/givaro-poly-local.C
Examining data/linbox-1.6.3/examples/graph-charpoly.C
Examining data/linbox-1.6.3/examples/grid_reduce.C
Examining data/linbox-1.6.3/examples/iliopoulos2.C
Examining data/linbox-1.6.3/examples/integer-mul.C
Examining data/linbox-1.6.3/examples/invariant-factors.C
Examining data/linbox-1.6.3/examples/map-sparse-test.C
Examining data/linbox-1.6.3/examples/map-sparse.h
Examining data/linbox-1.6.3/examples/mats.C
Examining data/linbox-1.6.3/examples/minpoly.C
Examining data/linbox-1.6.3/examples/mpidet.C
Examining data/linbox-1.6.3/examples/nullspacebasis.C
Examining data/linbox-1.6.3/examples/nullspacebasis_rank.C
Examining data/linbox-1.6.3/examples/omp_block_rank.C
Examining data/linbox-1.6.3/examples/poly-smith.C
Examining data/linbox-1.6.3/examples/power_rank.C
Examining data/linbox-1.6.3/examples/poweroftwo_ranks.C
Examining data/linbox-1.6.3/examples/qchar.C
Examining data/linbox-1.6.3/examples/rank.C
Examining data/linbox-1.6.3/examples/rr.C
Examining data/linbox-1.6.3/examples/samplebb.C
Examining data/linbox-1.6.3/examples/smith-form-kb.C
Examining data/linbox-1.6.3/examples/smith-form-local.C
Examining data/linbox-1.6.3/examples/smith.C
Examining data/linbox-1.6.3/examples/smithsparse.C
Examining data/linbox-1.6.3/examples/smithvalence.C
Examining data/linbox-1.6.3/examples/solve.C
Examining data/linbox-1.6.3/examples/solver/t-rdisolve.C
Examining data/linbox-1.6.3/examples/solverat.C
Examining data/linbox-1.6.3/examples/sparseelimdet.C
Examining data/linbox-1.6.3/examples/sparseelimrank.C
Examining data/linbox-1.6.3/examples/sparsesolverat.C
Examining data/linbox-1.6.3/examples/valence.C
Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-abstract.h
Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-collection.h
Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-data.h
Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-function.h
Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-functor.h
Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-type.h
Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox.C
Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox.h
Examining data/linbox-1.6.3/interfaces/driver/lb-charpoly.C
Examining data/linbox-1.6.3/interfaces/driver/lb-charpoly.h
Examining data/linbox-1.6.3/interfaces/driver/lb-det.C
Examining data/linbox-1.6.3/interfaces/driver/lb-det.h
Examining data/linbox-1.6.3/interfaces/driver/lb-domain-abstract.h
Examining data/linbox-1.6.3/interfaces/driver/lb-domain-collection.h
Examining data/linbox-1.6.3/interfaces/driver/lb-domain-data.h
Examining data/linbox-1.6.3/interfaces/driver/lb-domain-function.h
Examining data/linbox-1.6.3/interfaces/driver/lb-domain-functor.h
Examining data/linbox-1.6.3/interfaces/driver/lb-domain-type.h
Examining data/linbox-1.6.3/interfaces/driver/lb-domain.C
Examining data/linbox-1.6.3/interfaces/driver/lb-domain.h
Examining data/linbox-1.6.3/interfaces/driver/lb-driver.h
Examining data/linbox-1.6.3/interfaces/driver/lb-element-abstract.h
Examining data/linbox-1.6.3/interfaces/driver/lb-element-collection.h
Examining data/linbox-1.6.3/interfaces/driver/lb-element-data.h
Examining data/linbox-1.6.3/interfaces/driver/lb-element.C
Examining data/linbox-1.6.3/interfaces/driver/lb-element.h
Examining data/linbox-1.6.3/interfaces/driver/lb-garbage.C
Examining data/linbox-1.6.3/interfaces/driver/lb-garbage.h
Examining data/linbox-1.6.3/interfaces/driver/lb-interface.h
Examining data/linbox-1.6.3/interfaces/driver/lb-minpoly.C
Examining data/linbox-1.6.3/interfaces/driver/lb-minpoly.h
Examining data/linbox-1.6.3/interfaces/driver/lb-polynomial.C
Examining data/linbox-1.6.3/interfaces/driver/lb-polynomial.h
Examining data/linbox-1.6.3/interfaces/driver/lb-rank.C
Examining data/linbox-1.6.3/interfaces/driver/lb-rank.h
Examining data/linbox-1.6.3/interfaces/driver/lb-solve.C
Examining data/linbox-1.6.3/interfaces/driver/lb-solve.h
Examining data/linbox-1.6.3/interfaces/driver/lb-utilities.h
Examining data/linbox-1.6.3/interfaces/driver/lb-vector-abstract.h
Examining data/linbox-1.6.3/interfaces/driver/lb-vector-collection.h
Examining data/linbox-1.6.3/interfaces/driver/lb-vector-data.h
Examining data/linbox-1.6.3/interfaces/driver/lb-vector-function.h
Examining data/linbox-1.6.3/interfaces/driver/lb-vector-functor.h
Examining data/linbox-1.6.3/interfaces/driver/lb-vector-type.h
Examining data/linbox-1.6.3/interfaces/driver/lb-vector.C
Examining data/linbox-1.6.3/interfaces/driver/lb-vector.h
Examining data/linbox-1.6.3/interfaces/kaapi/communicate.h
Examining data/linbox-1.6.3/interfaces/maple-old/lbmaple-ffpack.C
Examining data/linbox-1.6.3/interfaces/maple-old/lbmaple.C
Examining data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h
Examining data/linbox-1.6.3/interfaces/maple/lb-maple.C
Examining data/linbox-1.6.3/interfaces/maple/lb-maple.h
Examining data/linbox-1.6.3/linbox/algorithms/alt-blackbox-block-container.h
Examining data/linbox-1.6.3/linbox/algorithms/bbcharpoly.h
Examining data/linbox-1.6.3/linbox/algorithms/bitonic-sort.h
Examining data/linbox-1.6.3/linbox/algorithms/blackbox-block-container-base.h
Examining data/linbox-1.6.3/linbox/algorithms/blackbox-block-container.h
Examining data/linbox-1.6.3/linbox/algorithms/blackbox-container-base.h
Examining data/linbox-1.6.3/linbox/algorithms/blackbox-container-symmetric.h
Examining data/linbox-1.6.3/linbox/algorithms/blackbox-container-symmetrize.h
Examining data/linbox-1.6.3/linbox/algorithms/blackbox-container.h
Examining data/linbox-1.6.3/linbox/algorithms/block-coppersmith-domain.h
Examining data/linbox-1.6.3/linbox/algorithms/block-lanczos.h
Examining data/linbox-1.6.3/linbox/algorithms/block-massey-domain.h
Examining data/linbox-1.6.3/linbox/algorithms/block-wiedemann.h
Examining data/linbox-1.6.3/linbox/algorithms/charpoly-rational.h
Examining data/linbox-1.6.3/linbox/algorithms/cia.h
Examining data/linbox-1.6.3/linbox/algorithms/classic-rational-reconstruction.h
Examining data/linbox-1.6.3/linbox/algorithms/coppersmith-invariant-factors.h
Examining data/linbox-1.6.3/linbox/algorithms/coppersmith.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-early-multip.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-full-multip-fixed.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-full-multip.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-single.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-var-prec-early-multip.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-var-prec-early-single.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-distributed.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-domain-omp.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-domain-sequential.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-domain.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-givrnsfixed.h
Examining data/linbox-1.6.3/linbox/algorithms/cra-kaapi.h
Examining data/linbox-1.6.3/linbox/algorithms/default.h
Examining data/linbox-1.6.3/linbox/algorithms/dense-container.h
Examining data/linbox-1.6.3/linbox/algorithms/dense-nullspace.h
Examining data/linbox-1.6.3/linbox/algorithms/det-rational.h
Examining data/linbox-1.6.3/linbox/algorithms/diophantine-solver.C
Examining data/linbox-1.6.3/linbox/algorithms/diophantine-solver.h
Examining data/linbox-1.6.3/linbox/algorithms/double-det.h
Examining data/linbox-1.6.3/linbox/algorithms/dyadic-to-rational.h
Examining data/linbox-1.6.3/linbox/algorithms/eliminator.h
Examining data/linbox-1.6.3/linbox/algorithms/fast-rational-reconstruction.h
Examining data/linbox-1.6.3/linbox/algorithms/frobenius-large.h
Examining data/linbox-1.6.3/linbox/algorithms/frobenius-small.h
Examining data/linbox-1.6.3/linbox/algorithms/gauss-gf2.h
Examining data/linbox-1.6.3/linbox/algorithms/gauss.h
Examining data/linbox-1.6.3/linbox/algorithms/hybrid-det.h
Examining data/linbox-1.6.3/linbox/algorithms/invariant-factors.h
Examining data/linbox-1.6.3/linbox/algorithms/invert-tb.h
Examining data/linbox-1.6.3/linbox/algorithms/la-block-lanczos.h
Examining data/linbox-1.6.3/linbox/algorithms/lanczos.h
Examining data/linbox-1.6.3/linbox/algorithms/last-invariant-factor.h
Examining data/linbox-1.6.3/linbox/algorithms/lattice.h
Examining data/linbox-1.6.3/linbox/algorithms/lazy-product.h
Examining data/linbox-1.6.3/linbox/algorithms/lifting-container.h
Examining data/linbox-1.6.3/linbox/algorithms/massey-domain.h
Examining data/linbox-1.6.3/linbox/algorithms/matpoly-mult.h
Examining data/linbox-1.6.3/linbox/algorithms/matrix-blas3/mul.h
Examining data/linbox-1.6.3/linbox/algorithms/matrix-hom.h
Examining data/linbox-1.6.3/linbox/algorithms/matrix-inverse.h
Examining data/linbox-1.6.3/linbox/algorithms/matrix-rank.h
Examining data/linbox-1.6.3/linbox/algorithms/mg-block-lanczos.h
Examining data/linbox-1.6.3/linbox/algorithms/minpoly-integer.h
Examining data/linbox-1.6.3/linbox/algorithms/minpoly-rational.h
Examining data/linbox-1.6.3/linbox/algorithms/numeric-solver-lapack.h
Examining data/linbox-1.6.3/linbox/algorithms/one-invariant-factor.h
Examining data/linbox-1.6.3/linbox/algorithms/opencl-environ.h
Examining data/linbox-1.6.3/linbox/algorithms/opencl-resource-controller.h
Examining data/linbox-1.6.3/linbox/algorithms/poly-det.h
Examining data/linbox-1.6.3/linbox/algorithms/poly-dixon.h
Examining data/linbox-1.6.3/linbox/algorithms/poly-interpolation.h
Examining data/linbox-1.6.3/linbox/algorithms/poly-smith-form-local-x.h
Examining data/linbox-1.6.3/linbox/algorithms/poly-smith-form.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/matpoly-add-domain.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/matpoly-mult-fft.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/matpoly-mult-kara.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/matpoly-mult-naive.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/order-basis.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-algorithms.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-butterflies.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-init.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-transform.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-matrix-domain.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/simd-additional-functions.h
Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/simd.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-cra-builder-early-multip.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-cra-builder-early-single.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-cra-builder-full-multip.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-cra-var-prec.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-cra.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-reconstruction.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-reconstruction2.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-solver-adaptive.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-solver-sn.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-solver.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-solver2.h
Examining data/linbox-1.6.3/linbox/algorithms/rns.h
Examining data/linbox-1.6.3/linbox/algorithms/short-vector.h
Examining data/linbox-1.6.3/linbox/algorithms/sigma-basis.h
Examining data/linbox-1.6.3/linbox/algorithms/signature.h
Examining data/linbox-1.6.3/linbox/algorithms/smith-form-adaptive.h
Examining data/linbox-1.6.3/linbox/algorithms/smith-form-binary.h
Examining data/linbox-1.6.3/linbox/algorithms/smith-form-iliopoulos.h
Examining data/linbox-1.6.3/linbox/algorithms/smith-form-kannan-bachem.h
Examining data/linbox-1.6.3/linbox/algorithms/smith-form-local.h
Examining data/linbox-1.6.3/linbox/algorithms/smith-form-sparseelim-local.h
Examining data/linbox-1.6.3/linbox/algorithms/smith-form-sparseelim-poweroftwo.h
Examining data/linbox-1.6.3/linbox/algorithms/smith-form-valence.h
Examining data/linbox-1.6.3/linbox/algorithms/toeplitz-det.h
Examining data/linbox-1.6.3/linbox/algorithms/triangular-solve-gf2.h
Examining data/linbox-1.6.3/linbox/algorithms/triangular-solve.h
Examining data/linbox-1.6.3/linbox/algorithms/vector-fraction.h
Examining data/linbox-1.6.3/linbox/algorithms/weak-popov-form.h
Examining data/linbox-1.6.3/linbox/algorithms/whisart_trace.h
Examining data/linbox-1.6.3/linbox/algorithms/wiedemann.h
Examining data/linbox-1.6.3/linbox/algorithms/rational-reconstruction-base.h
Examining data/linbox-1.6.3/linbox/blackbox/archetype.h
Examining data/linbox-1.6.3/linbox/blackbox/bb.h
Examining data/linbox-1.6.3/linbox/blackbox/blackbox-interface.h
Examining data/linbox-1.6.3/linbox/blackbox/blackbox.h
Examining data/linbox-1.6.3/linbox/blackbox/block-compose.h
Examining data/linbox-1.6.3/linbox/blackbox/block-hankel-inverse.h
Examining data/linbox-1.6.3/linbox/blackbox/block-hankel.h
Examining data/linbox-1.6.3/linbox/blackbox/block-toeplitz.h
Examining data/linbox-1.6.3/linbox/blackbox/blockbb.h
Examining data/linbox-1.6.3/linbox/blackbox/butterfly.h
Examining data/linbox-1.6.3/linbox/blackbox/companion.h
Examining data/linbox-1.6.3/linbox/blackbox/compose.h
Examining data/linbox-1.6.3/linbox/blackbox/csf.h
Examining data/linbox-1.6.3/linbox/blackbox/diagonal-gf2.h
Examining data/linbox-1.6.3/linbox/blackbox/diagonal.h
Examining data/linbox-1.6.3/linbox/blackbox/dif.h
Examining data/linbox-1.6.3/linbox/blackbox/direct-sum.h
Examining data/linbox-1.6.3/linbox/blackbox/factory.h
Examining data/linbox-1.6.3/linbox/blackbox/fflas-csr.h
Examining data/linbox-1.6.3/linbox/blackbox/fibb-product.h
Examining data/linbox-1.6.3/linbox/blackbox/fibb.h
Examining data/linbox-1.6.3/linbox/blackbox/frobenius.h
Examining data/linbox-1.6.3/linbox/blackbox/hilbert.h
Examining data/linbox-1.6.3/linbox/blackbox/inverse.h
Examining data/linbox-1.6.3/linbox/blackbox/jit-matrix.h
Examining data/linbox-1.6.3/linbox/blackbox/lambda-sparse.h
Examining data/linbox-1.6.3/linbox/blackbox/matrix-blackbox.h
Examining data/linbox-1.6.3/linbox/blackbox/moore-penrose.h
Examining data/linbox-1.6.3/linbox/blackbox/ntl-hankel.h
Examining data/linbox-1.6.3/linbox/blackbox/ntl-sylvester.h
Examining data/linbox-1.6.3/linbox/blackbox/null-matrix.h
Examining data/linbox-1.6.3/linbox/blackbox/pascal.h
Examining data/linbox-1.6.3/linbox/blackbox/permutation.h
Examining data/linbox-1.6.3/linbox/blackbox/polynomial.h
Examining data/linbox-1.6.3/linbox/blackbox/quad-matrix.h
Examining data/linbox-1.6.3/linbox/blackbox/random-matrix-traits.h
Examining data/linbox-1.6.3/linbox/blackbox/random-matrix.h
Examining data/linbox-1.6.3/linbox/blackbox/rational-matrix-factory.h
Examining data/linbox-1.6.3/linbox/blackbox/scalar-matrix.h
Examining data/linbox-1.6.3/linbox/blackbox/scompose.h
Examining data/linbox-1.6.3/linbox/blackbox/squarize.h
Examining data/linbox-1.6.3/linbox/blackbox/submatrix-traits.h
Examining data/linbox-1.6.3/linbox/blackbox/submatrix.h
Examining data/linbox-1.6.3/linbox/blackbox/sum.h
Examining data/linbox-1.6.3/linbox/blackbox/toeplitz.h
Examining data/linbox-1.6.3/linbox/blackbox/transpose.h
Examining data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h
Examining data/linbox-1.6.3/linbox/blackbox/zero-one.h
Examining data/linbox-1.6.3/linbox/blackbox/zo-gf2.h
Examining data/linbox-1.6.3/linbox/blackbox/zo.h
Examining data/linbox-1.6.3/linbox/blackbox/apply.h
Examining data/linbox-1.6.3/linbox/config-blas.h
Examining data/linbox-1.6.3/linbox/dummy.C
Examining data/linbox-1.6.3/linbox/element/abstract.h
Examining data/linbox-1.6.3/linbox/element/archetype.h
Examining data/linbox-1.6.3/linbox/element/envelope.h
Examining data/linbox-1.6.3/linbox/element/gmp-rational.h
Examining data/linbox-1.6.3/linbox/field/abstract.h
Examining data/linbox-1.6.3/linbox/field/archetype.h
Examining data/linbox-1.6.3/linbox/field/envelope.h
Examining data/linbox-1.6.3/linbox/field/field-documentation.h
Examining data/linbox-1.6.3/linbox/field/field-traits.h
Examining data/linbox-1.6.3/linbox/field/gf2.h
Examining data/linbox-1.6.3/linbox/field/gmp-rational.h
Examining data/linbox-1.6.3/linbox/field/hom.h
Examining data/linbox-1.6.3/linbox/field/map.h
Examining data/linbox-1.6.3/linbox/field/multimod-field.h
Examining data/linbox-1.6.3/linbox/field/param-fuzzy.h
Examining data/linbox-1.6.3/linbox/field/rebind.h
Examining data/linbox-1.6.3/linbox/integer.h
Examining data/linbox-1.6.3/linbox/iterators/blackbox-symmetric-iterator.h
Examining data/linbox-1.6.3/linbox/iterators/blackbox-symmetrize-iterator.h
Examining data/linbox-1.6.3/linbox/linbox-config.h
Examining data/linbox-1.6.3/linbox/linbox-tags.h
Examining data/linbox-1.6.3/linbox/matrix/abnormal-helpers.h
Examining data/linbox-1.6.3/linbox/matrix/abnormal-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/archetype.h
Examining data/linbox-1.6.3/linbox/matrix/dense-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix-multimod.h
Examining data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/densematrix/blas-transposed-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/factorized-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/grid.h
Examining data/linbox-1.6.3/linbox/matrix/matrix-category.h
Examining data/linbox-1.6.3/linbox/matrix/matrix-domain.h
Examining data/linbox-1.6.3/linbox/matrix/matrix-traits.h
Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/apply-domain.h
Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/blas-matrix-domain.h
Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/matrix-domain-gf2.h
Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/matrix-domain.h
Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain-factory.h
Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain.h
Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/plain-domain.h
Examining data/linbox-1.6.3/linbox/matrix/permutation-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/plain-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/polynomial-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/random-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/sliced3.h
Examining data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/sliced3/dense-sliced.h
Examining data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h
Examining data/linbox-1.6.3/linbox/matrix/sliced3/sliced-stepper.h
Examining data/linbox-1.6.3/linbox/matrix/sliced3/submat-iterator.h
Examining data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/SlicedPolynomialMatrix.h
Examining data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/SlicedPolynomialMatrixAddSub.h
Examining data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/SlicedPolynomialMatrixMulKaratsuba.h
Examining data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/SlicedPolynomialMatrixMulToomCook.h
Examining data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/conversion.h
Examining data/linbox-1.6.3/linbox/matrix/sparse-formats.h
Examining data/linbox-1.6.3/linbox/matrix/sparse-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/read-write-sparse.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-associative-vector.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-csr-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-domain.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ell-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ellr-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-generic.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-hyb-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-map-map-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-parallel-vector.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-sequence-vector.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-tpl-matrix-omp.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-tpl-matrix.h
Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/triples-coord.h
Examining data/linbox-1.6.3/linbox/matrix/transpose-matrix.h
Examining data/linbox-1.6.3/linbox/polynomial/dense-polynomial.h
Examining data/linbox-1.6.3/linbox/randiter/abstract.h
Examining data/linbox-1.6.3/linbox/randiter/archetype.h
Examining data/linbox-1.6.3/linbox/randiter/envelope.h
Examining data/linbox-1.6.3/linbox/randiter/generic.h
Examining data/linbox-1.6.3/linbox/randiter/gf2.h
Examining data/linbox-1.6.3/linbox/randiter/gmp-random-prime.h
Examining data/linbox-1.6.3/linbox/randiter/gmp-rational.h
Examining data/linbox-1.6.3/linbox/randiter/lidia-gfq.h
Examining data/linbox-1.6.3/linbox/randiter/lidia.h
Examining data/linbox-1.6.3/linbox/randiter/mersenne-twister.C
Examining data/linbox-1.6.3/linbox/randiter/mersenne-twister.h
Examining data/linbox-1.6.3/linbox/randiter/modular-balanced.h
Examining data/linbox-1.6.3/linbox/randiter/modular-crooked.h
Examining data/linbox-1.6.3/linbox/randiter/multimod-randomprime.h
Examining data/linbox-1.6.3/linbox/randiter/ntl-zz.h
Examining data/linbox-1.6.3/linbox/randiter/param-fuzzy.h
Examining data/linbox-1.6.3/linbox/randiter/random-fftprime.h
Examining data/linbox-1.6.3/linbox/randiter/random-prime.h
Examining data/linbox-1.6.3/linbox/ring/abstract.h
Examining data/linbox-1.6.3/linbox/ring/archetype.h
Examining data/linbox-1.6.3/linbox/ring/envelope.h
Examining data/linbox-1.6.3/linbox/ring/local-pir-modular.h
Examining data/linbox-1.6.3/linbox/ring/local2_32.h
Examining data/linbox-1.6.3/linbox/ring/modular.h
Examining data/linbox-1.6.3/linbox/ring/modular/modular-balanced-double.h
Examining data/linbox-1.6.3/linbox/ring/modular/modular-balanced-float.h
Examining data/linbox-1.6.3/linbox/ring/modular/modular-balanced-int32.h
Examining data/linbox-1.6.3/linbox/ring/modular/modular-balanced-int64.h
Examining data/linbox-1.6.3/linbox/ring/modular/modular-byte.h
Examining data/linbox-1.6.3/linbox/ring/modular/modular-double.h
Examining data/linbox-1.6.3/linbox/ring/modular/modular-float.h
Examining data/linbox-1.6.3/linbox/ring/modular/modular-int32.h
Examining data/linbox-1.6.3/linbox/ring/modular/modular-int64.h
Examining data/linbox-1.6.3/linbox/ring/modular/modular-short.h
Examining data/linbox-1.6.3/linbox/ring/modular/modular-unsigned.h
Examining data/linbox-1.6.3/linbox/ring/ntl.h
Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-gf2e.h
Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_p.h
Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h
Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pex.h
Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h
Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-rr.h
Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-zz.h
Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_p.h
Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h
Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_px.h
Examining data/linbox-1.6.3/linbox/ring/pid-ntl-zz_p.h
Examining data/linbox-1.6.3/linbox/ring/pir-modular-int32.h
Examining data/linbox-1.6.3/linbox/ring/pir-ntl-zz_p.h
Examining data/linbox-1.6.3/linbox/ring/polynomial-local-x.h
Examining data/linbox-1.6.3/linbox/ring/polynomial-ring.h
Examining data/linbox-1.6.3/linbox/ring/ring-interface.h
Examining data/linbox-1.6.3/linbox/solutions/charpoly.h
Examining data/linbox-1.6.3/linbox/solutions/constants.h
Examining data/linbox-1.6.3/linbox/solutions/det.h
Examining data/linbox-1.6.3/linbox/solutions/echelon.h
Examining data/linbox-1.6.3/linbox/solutions/echelon/echelon-auto.h
Examining data/linbox-1.6.3/linbox/solutions/echelon/echelon-dense-elimination.h
Examining data/linbox-1.6.3/linbox/solutions/getentry.h
Examining data/linbox-1.6.3/linbox/solutions/hadamard-bound.h
Examining data/linbox-1.6.3/linbox/solutions/is-positive-definite.h
Examining data/linbox-1.6.3/linbox/solutions/is-positive-semidefinite.h
Examining data/linbox-1.6.3/linbox/solutions/methods.h
Examining data/linbox-1.6.3/linbox/solutions/minpoly.h
Examining data/linbox-1.6.3/linbox/solutions/nullspace.h
Examining data/linbox-1.6.3/linbox/solutions/rank.h
Examining data/linbox-1.6.3/linbox/solutions/smith-form.h
Examining data/linbox-1.6.3/linbox/solutions/solution-tags.h
Examining data/linbox-1.6.3/linbox/solutions/solve.h
Examining data/linbox-1.6.3/linbox/solutions/solve/solve-auto.h
Examining data/linbox-1.6.3/linbox/solutions/solve/solve-blackbox.h
Examining data/linbox-1.6.3/linbox/solutions/solve/solve-cra.h
Examining data/linbox-1.6.3/linbox/solutions/solve/solve-dense-elimination.h
Examining data/linbox-1.6.3/linbox/solutions/solve/solve-dixon.h
Examining data/linbox-1.6.3/linbox/solutions/solve/solve-elimination.h
Examining data/linbox-1.6.3/linbox/solutions/solve/solve-lanczos.h
Examining data/linbox-1.6.3/linbox/solutions/solve/solve-numeric-symbolic.h
Examining data/linbox-1.6.3/linbox/solutions/solve/solve-sparse-elimination.h
Examining data/linbox-1.6.3/linbox/solutions/solve/solve-wiedemann.h
Examining data/linbox-1.6.3/linbox/solutions/trace.h
Examining data/linbox-1.6.3/linbox/solutions/valence.h
Examining data/linbox-1.6.3/linbox/util/args-parser.h
Examining data/linbox-1.6.3/linbox/util/commentator.h
Examining data/linbox-1.6.3/linbox/util/contracts.h
Examining data/linbox-1.6.3/linbox/util/debug.C
Examining data/linbox-1.6.3/linbox/util/debug.h
Examining data/linbox-1.6.3/linbox/util/error.C
Examining data/linbox-1.6.3/linbox/util/error.h
Examining data/linbox-1.6.3/linbox/util/field-axpy.h
Examining data/linbox-1.6.3/linbox/util/formats/generic-dense.h
Examining data/linbox-1.6.3/linbox/util/formats/maple.h
Examining data/linbox-1.6.3/linbox/util/formats/matrix-market.h
Examining data/linbox-1.6.3/linbox/util/formats/matrix-stream-readers.h
Examining data/linbox-1.6.3/linbox/util/formats/sms.h
Examining data/linbox-1.6.3/linbox/util/formats/sparse-row.h
Examining data/linbox-1.6.3/linbox/util/iml_wrapper.h
Examining data/linbox-1.6.3/linbox/util/matrix-stream.h
Examining data/linbox-1.6.3/linbox/util/mpicpp.h
Examining data/linbox-1.6.3/linbox/util/prime-stream.h
Examining data/linbox-1.6.3/linbox/util/serialization.h
Examining data/linbox-1.6.3/linbox/util/timer.h
Examining data/linbox-1.6.3/linbox/util/write-mm.h
Examining data/linbox-1.6.3/linbox/vector/bit-vector.h
Examining data/linbox-1.6.3/linbox/vector/blas-vector.h
Examining data/linbox-1.6.3/linbox/vector/light_container.h
Examining data/linbox-1.6.3/linbox/vector/pair.h
Examining data/linbox-1.6.3/linbox/vector/random.h
Examining data/linbox-1.6.3/linbox/vector/reverse.h
Examining data/linbox-1.6.3/linbox/vector/slicedpolynomialvector/SlicedPolynomialMatrixVectorMulKaratsuba.h
Examining data/linbox-1.6.3/linbox/vector/slicedpolynomialvector/SlicedPolynomialVector.h
Examining data/linbox-1.6.3/linbox/vector/slicedpolynomialvector/SlicedPolynomialVectorAddSub.h
Examining data/linbox-1.6.3/linbox/vector/sparse.h
Examining data/linbox-1.6.3/linbox/vector/stream-gf2.h
Examining data/linbox-1.6.3/linbox/vector/stream.h
Examining data/linbox-1.6.3/linbox/vector/subiterator.h
Examining data/linbox-1.6.3/linbox/vector/subvector.h
Examining data/linbox-1.6.3/linbox/vector/vector-domain-gf2.h
Examining data/linbox-1.6.3/linbox/vector/vector-domain.h
Examining data/linbox-1.6.3/linbox/vector/vector-traits.h
Examining data/linbox-1.6.3/linbox/vector/vector.h
Examining data/linbox-1.6.3/macros/CodeChunk/instrset.h
Examining data/linbox-1.6.3/macros/CodeChunk/instrset_detect.cpp
Examining data/linbox-1.6.3/template.h
Examining data/linbox-1.6.3/tests/benchmark-blas-domain.C
Examining data/linbox-1.6.3/tests/benchmark-fields.C
Examining data/linbox-1.6.3/tests/checker.C
Examining data/linbox-1.6.3/tests/matrix/coin.h
Examining data/linbox-1.6.3/tests/matrix/hadamard.h
Examining data/linbox-1.6.3/tests/matrix/invhilb.h
Examining data/linbox-1.6.3/tests/matrix/jmat.h
Examining data/linbox-1.6.3/tests/matrix/minmax.h
Examining data/linbox-1.6.3/tests/matrix/randomans.h
Examining data/linbox-1.6.3/tests/matrix/randommat.h
Examining data/linbox-1.6.3/tests/test-bitonic-sort.C
Examining data/linbox-1.6.3/tests/test-blackbox-block-container.C
Examining data/linbox-1.6.3/tests/test-blackbox.h
Examining data/linbox-1.6.3/tests/test-blas-domain.C
Examining data/linbox-1.6.3/tests/test-blas-matrix.C
Examining data/linbox-1.6.3/tests/test-block-ring.C
Examining data/linbox-1.6.3/tests/test-block-wiedemann.C
Examining data/linbox-1.6.3/tests/test-butterfly.C
Examining data/linbox-1.6.3/tests/test-charpoly.C
Examining data/linbox-1.6.3/tests/test-commentator.C
Examining data/linbox-1.6.3/tests/test-common.h
Examining data/linbox-1.6.3/tests/test-companion.C
Examining data/linbox-1.6.3/tests/test-cra.C
Examining data/linbox-1.6.3/tests/test-cradomain.C
Examining data/linbox-1.6.3/tests/test-dense-zero-one.C
Examining data/linbox-1.6.3/tests/test-dense.C
Examining data/linbox-1.6.3/tests/test-det.C
Examining data/linbox-1.6.3/tests/test-diagonal.C
Examining data/linbox-1.6.3/tests/test-dif.C
Examining data/linbox-1.6.3/tests/test-direct-sum.C
Examining data/linbox-1.6.3/tests/test-dyadic-to-rational.C
Examining data/linbox-1.6.3/tests/test-echelon-form.C
Examining data/linbox-1.6.3/tests/test-ffpack.C
Examining data/linbox-1.6.3/tests/test-fibb.C
Examining data/linbox-1.6.3/tests/test-field.h
Examining data/linbox-1.6.3/tests/test-frobenius-large.C
Examining data/linbox-1.6.3/tests/test-frobenius-small.C
Examining data/linbox-1.6.3/tests/test-frobenius.C
Examining data/linbox-1.6.3/tests/test-ftrmm.C
Examining data/linbox-1.6.3/tests/test-generic.h
Examining data/linbox-1.6.3/tests/test-getentry.C
Examining data/linbox-1.6.3/tests/test-gf2.C
Examining data/linbox-1.6.3/tests/test-givaro-interfaces.C
Examining data/linbox-1.6.3/tests/test-givaro-zpz.C
Examining data/linbox-1.6.3/tests/test-givaro-zpzuns.C
Examining data/linbox-1.6.3/tests/test-givaropoly.C
Examining data/linbox-1.6.3/tests/test-gmp-rational.C
Examining data/linbox-1.6.3/tests/test-hadamard-bound.C
Examining data/linbox-1.6.3/tests/test-hilbert.C
Examining data/linbox-1.6.3/tests/test-hom.C
Examining data/linbox-1.6.3/tests/test-image-field.C
Examining data/linbox-1.6.3/tests/test-invariant-factors.C
Examining data/linbox-1.6.3/tests/test-inverse.C
Examining data/linbox-1.6.3/tests/test-isposdef.C
Examining data/linbox-1.6.3/tests/test-ispossemidef.C
Examining data/linbox-1.6.3/tests/test-la-block-lanczos.C
Examining data/linbox-1.6.3/tests/test-last-invariant-factor.C
Examining data/linbox-1.6.3/tests/test-local-smith-form-sparseelim.C
Examining data/linbox-1.6.3/tests/test-matpoly-mult.C
Examining data/linbox-1.6.3/tests/test-matrix-domain.C
Examining data/linbox-1.6.3/tests/test-matrix-domain.h
Examining data/linbox-1.6.3/tests/test-matrix-stream.C
Examining data/linbox-1.6.3/tests/test-matrix-utils.h
Examining data/linbox-1.6.3/tests/test-mg-block-lanczos.C
Examining data/linbox-1.6.3/tests/test-minpoly.C
Examining data/linbox-1.6.3/tests/test-modular-balanced-double.C
Examining data/linbox-1.6.3/tests/test-modular-balanced-float.C
Examining data/linbox-1.6.3/tests/test-modular-balanced-int.C
Examining data/linbox-1.6.3/tests/test-modular-byte.C
Examining data/linbox-1.6.3/tests/test-modular-double.C
Examining data/linbox-1.6.3/tests/test-modular-float.C
Examining data/linbox-1.6.3/tests/test-modular-int.C
Examining data/linbox-1.6.3/tests/test-modular-short.C
Examining data/linbox-1.6.3/tests/test-modular.C
Examining data/linbox-1.6.3/tests/test-moore-penrose.C
Examining data/linbox-1.6.3/tests/test-mpi-comm.C
Examining data/linbox-1.6.3/tests/test-ntl-hankel.C
Examining data/linbox-1.6.3/tests/test-ntl-lzz_p.C
Examining data/linbox-1.6.3/tests/test-ntl-lzz_pe.C
Examining data/linbox-1.6.3/tests/test-ntl-lzz_pex.C
Examining data/linbox-1.6.3/tests/test-ntl-lzz_px.C
Examining data/linbox-1.6.3/tests/test-ntl-rr.C
Examining data/linbox-1.6.3/tests/test-ntl-sylvester.C
Examining data/linbox-1.6.3/tests/test-ntl-toeplitz.C
Examining data/linbox-1.6.3/tests/test-ntl-zz_p.C
Examining data/linbox-1.6.3/tests/test-nullspace.C
Examining data/linbox-1.6.3/tests/test-one-invariant-factor.C
Examining data/linbox-1.6.3/tests/test-opencl-domain.C
Examining data/linbox-1.6.3/tests/test-optimization.C
Examining data/linbox-1.6.3/tests/test-order-basis.C
Examining data/linbox-1.6.3/tests/test-param-fuzzy.C
Examining data/linbox-1.6.3/tests/test-permutation.C
Examining data/linbox-1.6.3/tests/test-plain-domain.C
Examining data/linbox-1.6.3/tests/test-poly-det.C
Examining data/linbox-1.6.3/tests/test-poly-smith-form.h
Examining data/linbox-1.6.3/tests/test-polynomial-ring.C
Examining data/linbox-1.6.3/tests/test-qlup.C
Examining data/linbox-1.6.3/tests/test-quad-matrix.C
Examining data/linbox-1.6.3/tests/test-randiter-nonzero-prime.C
Examining data/linbox-1.6.3/tests/test-random-matrix.C
Examining data/linbox-1.6.3/tests/test-rank-Int.C
Examining data/linbox-1.6.3/tests/test-rank-md.C
Examining data/linbox-1.6.3/tests/test-rank-u32.C
Examining data/linbox-1.6.3/tests/test-rank.h
Examining data/linbox-1.6.3/tests/test-rat-charpoly.C
Examining data/linbox-1.6.3/tests/test-rat-minpoly.C
Examining data/linbox-1.6.3/tests/test-rat-solve.C
Examining data/linbox-1.6.3/tests/test-rational-matrix-factory.C
Examining data/linbox-1.6.3/tests/test-rational-reconstruction-base.C
Examining data/linbox-1.6.3/tests/test-rational-solver-adaptive.C
Examining data/linbox-1.6.3/tests/test-rational-solver.C
Examining data/linbox-1.6.3/tests/test-regression.C
Examining data/linbox-1.6.3/tests/test-scalar-matrix.C
Examining data/linbox-1.6.3/tests/test-serialization.C
Examining data/linbox-1.6.3/tests/test-smith-form-adaptive.C
Examining data/linbox-1.6.3/tests/test-smith-form-binary.C
Examining data/linbox-1.6.3/tests/test-smith-form-iliopoulos.C
Examining data/linbox-1.6.3/tests/test-smith-form-local.C
Examining data/linbox-1.6.3/tests/test-smith-form-valence.C
Examining data/linbox-1.6.3/tests/test-smith-form.C
Examining data/linbox-1.6.3/tests/test-smith-form.h
Examining data/linbox-1.6.3/tests/test-solve-full.C
Examining data/linbox-1.6.3/tests/test-solve-nonsingular.C
Examining data/linbox-1.6.3/tests/test-solve.C
Examining data/linbox-1.6.3/tests/test-sparse-map-map.C
Examining data/linbox-1.6.3/tests/test-sparse.C
Examining data/linbox-1.6.3/tests/test-subiterator.C
Examining data/linbox-1.6.3/tests/test-submatrix.C
Examining data/linbox-1.6.3/tests/test-subvector.C
Examining data/linbox-1.6.3/tests/test-sum.C
Examining data/linbox-1.6.3/tests/test-toeplitz-det.C
Examining data/linbox-1.6.3/tests/test-toeplitz.C
Examining data/linbox-1.6.3/tests/test-toom-cook.C
Examining data/linbox-1.6.3/tests/test-trace.C
Examining data/linbox-1.6.3/tests/test-transpose.C
Examining data/linbox-1.6.3/tests/test-triplesbb-omp.C
Examining data/linbox-1.6.3/tests/test-triplesbb.C
Examining data/linbox-1.6.3/tests/test-tutorial.C
Examining data/linbox-1.6.3/tests/test-vector-domain.C
Examining data/linbox-1.6.3/tests/test-vector-domain.h
Examining data/linbox-1.6.3/tests/test-weak-popov-form.C
Examining data/linbox-1.6.3/tests/test-zero-one.C

FINAL RESULTS:

data/linbox-1.6.3/benchmarks/benchmark.C:1447:15:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				int err = system( command.c_str() ) ;
data/linbox-1.6.3/benchmarks/benchmark.C:1503:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			int err = system( "test -d data || ( rm -rf data && mkdir data )" ) ;
data/linbox-1.6.3/examples/qchar.C:403:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(numstr, strtok(xstr, "/"));
data/linbox-1.6.3/examples/qchar.C:405:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(tenstr, strtok(NULL, "/"));
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:123:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(msg, out.str().c_str());
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:203:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(msg, out.str().c_str());
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:280:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(msg, out.str().c_str());
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:350:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(msg, out.str().c_str());
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:420:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(msg, out.str().c_str());
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:482:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		std::strcpy(ptr, tp.c_str());
data/linbox-1.6.3/tests/checker.C:161:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system("ls test-*C >.tmp-tests");
data/linbox-1.6.3/tests/checker.C:183:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				system(cmd.c_str());
data/linbox-1.6.3/tests/checker.C:188:17:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			int status = system(cmd.c_str());
data/linbox-1.6.3/tests/checker.C:199:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				status = system(prog.str().c_str());
data/linbox-1.6.3/tests/test-field.h:395:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:446:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:499:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:574:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:647:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:718:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:799:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:856:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:942:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:1021:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:1098:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:1167:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:1224:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:1256:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:1303:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (st, str.str().c_str());
data/linbox-1.6.3/tests/test-field.h:1474:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (st, str.str().c_str());
data/linbox-1.6.3/benchmarks/benchmark-example.C:95:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		RandMat.random(A);
data/linbox-1.6.3/benchmarks/benchmark-example.C:96:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		RandMat.random(B);
data/linbox-1.6.3/benchmarks/benchmark-example.C:97:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		RandMat.random(C);
data/linbox-1.6.3/benchmarks/benchmark-order-basis.C:287:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				Gen.random(Serie->ref(i,j,k));
data/linbox-1.6.3/benchmarks/benchmark-solve-cra.C:74:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    B.random(randIter);
data/linbox-1.6.3/benchmarks/benchmark-solve-cra.C:124:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        srand(seed);
data/linbox-1.6.3/benchmarks/benchmark.C:1497:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			srand((unsigned)time(NULL));
data/linbox-1.6.3/benchmarks/gen-blocks.C:113:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(seed);
data/linbox-1.6.3/examples/bench-fft.C:50:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r.random(v[i]);
data/linbox-1.6.3/examples/bench-matpoly-mult.C:95:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r.random(v[i]); 
data/linbox-1.6.3/examples/bench-matpoly-mult.C:102:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random(m.refEntry(i,j));
data/linbox-1.6.3/examples/bench-matpoly-mult.C:357:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand(time(NULL));
data/linbox-1.6.3/examples/bench-new-fft.C:52:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r.random(v[i]);
data/linbox-1.6.3/examples/blackbox/example.C:135:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand (time (NULL));
data/linbox-1.6.3/examples/blassolve.C:85:17:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            if (drand48() <0.5)
data/linbox-1.6.3/examples/grid_reduce.C:44:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/linbox-1.6.3/examples/iliopoulos2.C:75:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	RDM.random(L);
data/linbox-1.6.3/examples/iliopoulos2.C:89:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	RDM.random(U);
data/linbox-1.6.3/examples/map-sparse-test.C:23:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/examples/omp_block_rank.C:263:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			generator.random( *vit );
data/linbox-1.6.3/examples/omp_block_rank.C:297:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		do generator.random (d1[i]); while (F.isZero (d1[i]));
data/linbox-1.6.3/examples/omp_block_rank.C:301:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		do generator.random (d2[i]); while (F.isZero (d2[i]));
data/linbox-1.6.3/examples/omp_block_rank.C:436:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			do generator.random (*itp); while (F.isZero (*itp));
data/linbox-1.6.3/examples/poly-smith.C:107:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			Rand.random(tmp, Givaro::Degree(d));
data/linbox-1.6.3/examples/smith-form-kb.C:120:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/linbox-1.6.3/examples/solve.C:108:9:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				if (drand48() <0.5)
data/linbox-1.6.3/examples/solve.C:212:9:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				if (drand48() <0.5)
data/linbox-1.6.3/examples/solver/t-rdisolve.C:421:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		ri.random(bentries[i]);
data/linbox-1.6.3/examples/solver/t-rdisolve.C:427:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		ri.random(Aentries[i]);
data/linbox-1.6.3/examples/solver/t-rdisolve.C:489:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(entrySeed);
data/linbox-1.6.3/examples/solverat.C:90:9:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				if (drand48() <0.5)
data/linbox-1.6.3/examples/sparsesolverat.C:82:9:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				if (drand48() <0.5)
data/linbox-1.6.3/interfaces/driver/lb-blackbox.C:137:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				G.random(B->refEntry(i,j));
data/linbox-1.6.3/interfaces/driver/lb-vector.C:144:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			G.random((*V)[i]);
data/linbox-1.6.3/linbox/algorithms/bbcharpoly.h:515:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
						g.random(gamma);
data/linbox-1.6.3/linbox/algorithms/blackbox-block-container-base.h:237:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                G.random(*iter_U);
data/linbox-1.6.3/linbox/algorithms/blackbox-block-container-base.h:241:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                G.random(*iter_V);
data/linbox-1.6.3/linbox/algorithms/blackbox-container-base.h:161:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				g.random (u[(size_t)i]);
data/linbox-1.6.3/linbox/algorithms/blackbox-container.h:91:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				g.random (this->u[(size_t)i]);
data/linbox-1.6.3/linbox/algorithms/blackbox-container.h:94:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				g.random (this->w[(size_t)i]);
data/linbox-1.6.3/linbox/algorithms/block-wiedemann.h:121:63:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                                                        _rand.random(V.refEntry(i,j));
data/linbox-1.6.3/linbox/algorithms/block-wiedemann.h:125:63:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                                                        _rand.random(UA.refEntry(i,j));
data/linbox-1.6.3/linbox/algorithms/coppersmith-invariant-factors.h:73:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		RDM.random(U_);
data/linbox-1.6.3/linbox/algorithms/coppersmith-invariant-factors.h:74:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		RDM.random(V_);
data/linbox-1.6.3/linbox/algorithms/coppersmith-invariant-factors.h:83:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		RDM.random(U_);
data/linbox-1.6.3/linbox/algorithms/coppersmith-invariant-factors.h:84:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		RDM.random(V_);
data/linbox-1.6.3/linbox/algorithms/coppersmith.h:95:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			U.random();
data/linbox-1.6.3/linbox/algorithms/coppersmith.h:96:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			W.random();
data/linbox-1.6.3/linbox/algorithms/coppersmith.h:274:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			U.random();
data/linbox-1.6.3/linbox/algorithms/coppersmith.h:275:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			V.random();
data/linbox-1.6.3/linbox/algorithms/coppersmith.h:301:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					iter.random(*evalit);
data/linbox-1.6.3/linbox/algorithms/coppersmith.h:412:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			U.random();
data/linbox-1.6.3/linbox/algorithms/coppersmith.h:413:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			V.random();
data/linbox-1.6.3/linbox/algorithms/coppersmith.h:439:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					do iter.random(*evalit); while(field().isZero(*evalit));
data/linbox-1.6.3/linbox/algorithms/cra-builder-early-multip.h:94:23:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				*int_p = ((size_t)lrand48()) % 20000;
data/linbox-1.6.3/linbox/algorithms/cra-builder-early-multip.h:111:23:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				*int_p = ((size_t)lrand48()) % 20000;
data/linbox-1.6.3/linbox/algorithms/cra-builder-early-multip.h:130:23:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				*int_p = ((size_t)lrand48()) % 20000;
data/linbox-1.6.3/linbox/algorithms/cra-builder-early-multip.h:207:23:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				*int_p = ((size_t)lrand48()) % 20000;
data/linbox-1.6.3/linbox/algorithms/cra-builder-var-prec-early-multip.h:120:23:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				*int_p = ((size_t)lrand48()) % 20000 - 10000;
data/linbox-1.6.3/linbox/algorithms/cra-builder-var-prec-early-multip.h:142:23:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				*int_p = ((size_t)lrand48()) % 20000 - 10000;
data/linbox-1.6.3/linbox/algorithms/cra-builder-var-prec-early-multip.h:500:23:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				*int_p = ((size_t)lrand48()) % 20000;
data/linbox-1.6.3/linbox/algorithms/frobenius-large.h:83:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			_RI.random(c);
data/linbox-1.6.3/linbox/algorithms/frobenius-small.h:142:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			_RI.random(e);
data/linbox-1.6.3/linbox/algorithms/invariant-factors.h:94:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		RDM.random(U);
data/linbox-1.6.3/linbox/algorithms/invariant-factors.h:95:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		RDM.random(V);
data/linbox-1.6.3/linbox/algorithms/invariant-factors.h:118:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		RDM.random(U);
data/linbox-1.6.3/linbox/algorithms/invariant-factors.h:119:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		RDM.random(V);
data/linbox-1.6.3/linbox/algorithms/invariant-factors.h:274:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			RI.random(elm);
data/linbox-1.6.3/linbox/algorithms/last-invariant-factor.h:185:53:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                                        *b_p = _gen.random();//(* b_p);
data/linbox-1.6.3/linbox/algorithms/last-invariant-factor.h:189:53:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                                        *b_p = _gen.random();//(* b_p);
data/linbox-1.6.3/linbox/algorithms/lifting-container.h:757:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					_rand.random(UU.refEntry(i,j));
data/linbox-1.6.3/linbox/algorithms/lifting-container.h:762:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					_rand.random(V.refEntry(i,j));
data/linbox-1.6.3/linbox/algorithms/lifting-container.h:780:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				_rand.random(UAp.refEntry(0,i));
data/linbox-1.6.3/linbox/algorithms/matpoly-mult.h:989:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			srand((unsigned int)time(NULL));
data/linbox-1.6.3/linbox/algorithms/matpoly-mult.h:1052:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				srand((unsigned int)time(NULL));
data/linbox-1.6.3/linbox/algorithms/matpoly-mult.h:1274:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				srand((unsigned int)time(NULL));
data/linbox-1.6.3/linbox/algorithms/matpoly-mult.h:1433:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				srand((unsigned int)time(NULL));
data/linbox-1.6.3/linbox/algorithms/poly-smith-form.h:253:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				_RI.random(e, max_deg);
data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/order-basis.h:82:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                        Gen.random(U.ref(i,0,0));
data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-init.h:125:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			srand((unsigned int) time(NULL));
data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-transform.h:106:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			srand((unsigned int) time(NULL));
data/linbox-1.6.3/linbox/algorithms/rational-cra-builder-early-multip.h:73:23:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				*int_p = ((size_t)lrand48()) % 20000;
data/linbox-1.6.3/linbox/algorithms/rational-cra-builder-early-multip.h:92:23:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				*int_p = ((size_t)lrand48()) % 20000;
data/linbox-1.6.3/linbox/algorithms/vector-fraction.h:230:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				randiter.random(A);
data/linbox-1.6.3/linbox/algorithms/vector-fraction.h:285:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				randiter.random(A);
data/linbox-1.6.3/linbox/blackbox/companion.h:79:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				r.random(*i); // we'll pretend p[n] == 1, ok?
data/linbox-1.6.3/linbox/blackbox/companion.h:103:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				r.random(*i); // we'll pretend p[n] == 1, ok?
data/linbox-1.6.3/linbox/blackbox/diagonal.h:151:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		void random();
data/linbox-1.6.3/linbox/blackbox/diagonal.h:336:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			Nrow.random();
data/linbox-1.6.3/linbox/blackbox/diagonal.h:349:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			Ncol.random();
data/linbox-1.6.3/linbox/blackbox/diagonal.h:590:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			random();
data/linbox-1.6.3/linbox/blackbox/diagonal.h:603:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			iter.random(*i);
data/linbox-1.6.3/linbox/blackbox/diagonal.h:605:3:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		random();
data/linbox-1.6.3/linbox/blackbox/diagonal.h:610:66:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	inline void Diagonal<_Field, VectorCategories::DenseVectorTag>::random()
data/linbox-1.6.3/linbox/blackbox/diagonal.h:615:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random(*i);
data/linbox-1.6.3/linbox/blackbox/diagonal.h:625:28:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			while (field().isZero(r.random(*i))) ;
data/linbox-1.6.3/linbox/blackbox/fibb.h:86:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Matrix X(Xb); X.random();
data/linbox-1.6.3/linbox/blackbox/fibb.h:102:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Matrix X(Xb); X.random();
data/linbox-1.6.3/linbox/blackbox/jit-matrix.h:168:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			return _r.random(e);
data/linbox-1.6.3/linbox/blackbox/permutation.h:114:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		void random(unsigned int seed=(unsigned int)time(NULL))
data/linbox-1.6.3/linbox/blackbox/scalar-matrix.h:136:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		{ iter.random(v_); }
data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h:62:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		void random() { rep_->random(); }
data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h:62:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		void random() { rep_->random(); }
data/linbox-1.6.3/linbox/field/multimod-field.h:423:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		std::vector<double>& random(std::vector<double> &x) const
data/linbox-1.6.3/linbox/field/multimod-field.h:426:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				_randiter[i]->random(x[i]);
data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:539:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		void random()
data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:542:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			B.random();
data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:546:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		void random(const Rand&)
data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:548:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			return random();
data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:933:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		void random();
data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:936:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		void random(const T&)
data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:938:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			return random() ;
data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:1228:83:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	void BlasMatrix<Givaro::ZRing<Integer>, Vector<Givaro::ZRing<Integer>>::Dense >::random<size_t>(const size_t & b)
data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:1235:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				R.random(refEntry(i,j));
data/linbox-1.6.3/linbox/matrix/plain-matrix.h:117:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Self_t& random() // set to random entries, no shape change
data/linbox-1.6.3/linbox/matrix/plain-matrix.h:122:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					setEntry(i, j, r.random(x));
data/linbox-1.6.3/linbox/matrix/plain-matrix.h:199:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		using Father_t::random;
data/linbox-1.6.3/linbox/matrix/random-matrix.h:108:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Matrix & random(Matrix & A) ;
data/linbox-1.6.3/linbox/matrix/sliced3/dense-sliced.h:143:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	SlicedBase & random(){ // needs fix: not uniform, not full.
data/linbox-1.6.3/linbox/matrix/sliced3/dense-sliced.h:483:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Sliced& random(size_t seed = 0){
data/linbox-1.6.3/linbox/matrix/sliced3/dense-sliced.h:484:12:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		if(seed) srand(seed);
data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h:124:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Matrix& random(Matrix &A, size_t seed=0) const {
data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h:125:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		return A.random(seed);
data/linbox-1.6.3/linbox/randiter/abstract.h:99:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		virtual Element &random (Element &a) = 0;
data/linbox-1.6.3/linbox/randiter/archetype.h:156:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element &random (Element &a) const
data/linbox-1.6.3/linbox/randiter/archetype.h:158:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			_randIter_ptr->random (*a._elem_ptr);
data/linbox-1.6.3/linbox/randiter/envelope.h:150:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		ElementAbstract &random (ElementAbstract &a)
data/linbox-1.6.3/linbox/randiter/envelope.h:155:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			_randIter.random(static_cast<ElementEnvelope<Field>&> (a)._elem );
data/linbox-1.6.3/linbox/randiter/generic.h:114:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			srand (_seed);
data/linbox-1.6.3/linbox/randiter/generic.h:139:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element &random (Element &a) const
data/linbox-1.6.3/linbox/randiter/generic.h:148:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		ElementAbstract &random (ElementAbstract &a) const
data/linbox-1.6.3/linbox/randiter/generic.h:152:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			random (tmp);
data/linbox-1.6.3/linbox/randiter/gf2.h:96:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		bool &random (bool &a)  const
data/linbox-1.6.3/linbox/randiter/gf2.h:107:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		BitVector::reference random (BitVector::reference a)  const
data/linbox-1.6.3/linbox/randiter/gf2.h:117:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		stdBitReference random (stdBitReference a)  const
data/linbox-1.6.3/linbox/randiter/gf2.h:126:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		ElementAbstract &random (ElementAbstract &a)  const
data/linbox-1.6.3/linbox/randiter/gf2.h:130:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			random (tmp);
data/linbox-1.6.3/linbox/randiter/gf2.h:135:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		uint32_t& random (uint32_t& a)  const
data/linbox-1.6.3/linbox/randiter/gmp-rational.h:99:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element &random (Element &a)  const
data/linbox-1.6.3/linbox/randiter/gmp-rational.h:107:6:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				 srand (s);
data/linbox-1.6.3/linbox/randiter/gmp-rational.h:124:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				srand (s);
data/linbox-1.6.3/linbox/randiter/gmp-rational.h:133:6:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					srand (s);
data/linbox-1.6.3/linbox/randiter/gmp-rational.h:155:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		ElementAbstract &random (ElementAbstract &a)  const
data/linbox-1.6.3/linbox/randiter/gmp-rational.h:159:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			random (tmp);
data/linbox-1.6.3/linbox/randiter/lidia-gfq.h:100:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element& random (Element& x)  const
data/linbox-1.6.3/linbox/randiter/mersenne-twister.C:140:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		uint32_t random;
data/linbox-1.6.3/linbox/randiter/mersenne-twister.C:168:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		return start + random;
data/linbox-1.6.3/linbox/randiter/modular-balanced.h:117:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			srand ((unsigned)_seed);
data/linbox-1.6.3/linbox/randiter/modular-balanced.h:157:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element &random (Element &a) const
data/linbox-1.6.3/linbox/randiter/modular-balanced.h:167:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		ElementAbstract &random (ElementAbstract &a) const
data/linbox-1.6.3/linbox/randiter/modular-balanced.h:171:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			random (tmp);
data/linbox-1.6.3/linbox/randiter/modular-crooked.h:96:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			srand ((unsigned int)_seed);
data/linbox-1.6.3/linbox/randiter/modular-crooked.h:136:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element &random (Element &a) const
data/linbox-1.6.3/linbox/randiter/modular-crooked.h:145:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		ElementAbstract &random (ElementAbstract &a) const
data/linbox-1.6.3/linbox/randiter/modular-crooked.h:149:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			random (tmp);
data/linbox-1.6.3/linbox/randiter/multimod-randomprime.h:74:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					integer::random(tmp[i],_bits-1);
data/linbox-1.6.3/linbox/randiter/multimod-randomprime.h:91:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					integer::random(p[i],_bits-1);
data/linbox-1.6.3/linbox/randiter/ntl-zz.h:52:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element& random (Element& x) const
data/linbox-1.6.3/linbox/randiter/param-fuzzy.h:85:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element &random (Element &a)  const
data/linbox-1.6.3/linbox/randiter/param-fuzzy.h:94:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		ElementAbstract &random (ElementAbstract &a) const
data/linbox-1.6.3/linbox/randiter/param-fuzzy.h:98:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			random (tmp);
data/linbox-1.6.3/linbox/ring/local-pir-modular.h:129:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        using Parent_t:: random;
data/linbox-1.6.3/linbox/ring/ntl/ntl-gf2e.h:229:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element& random (Element& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-gf2e.h:231:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                NTL::random(x);
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_p.h:367:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		NTL::zz_p& random(NTL::zz_p& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h:165:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element& random (Element& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h:167:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                NTL::random(x);
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h:419:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element& random (Element& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h:421:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                NTL::random(x);
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pex.h:553:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element& random (Element& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pex.h:555:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                NTL::random(x, 1);
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h:606:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element& random (Element& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h:608:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			NTL::random(x, 1);
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h:612:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element& random(Element &x, size_t d) const {
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h:613:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			NTL::random(x, d + 1);
data/linbox-1.6.3/linbox/ring/ntl/ntl-rr.h:324:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Element& random(Element &elt) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_p.h:518:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		NTL::ZZ_p& random(NTL::ZZ_p& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:341:7:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			is.setstate(std::istream::failbit);
data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:343:8:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				is.setstate(std::istream::badbit);
data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:422:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		NTL::ZZ_pE& random (NTL::ZZ_pE& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:424:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			NTL::random(x);
data/linbox-1.6.3/linbox/solutions/det.h:231:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					do iter.random (diag[i]); while (F.isZero (diag[i]));
data/linbox-1.6.3/linbox/solutions/det.h:289:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					do iter.random (diag[i]); while (F.isZero (diag[i]));
data/linbox-1.6.3/linbox/vector/blas-vector.h:507:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		void random()
data/linbox-1.6.3/linbox/vector/blas-vector.h:512:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				setEntry(i, r.random(x));
data/linbox-1.6.3/linbox/vector/blas-vector.h:516:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		void random( RandIter r)
data/linbox-1.6.3/linbox/vector/blas-vector.h:520:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				setEntry(i, r.random(x));
data/linbox-1.6.3/linbox/vector/random.h:105:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random(*iter);
data/linbox-1.6.3/linbox/vector/random.h:144:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random(iter->second);
data/linbox-1.6.3/linbox/vector/random.h:188:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random(temp);
data/linbox-1.6.3/linbox/vector/stream.h:293:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				_r.random (*i);
data/linbox-1.6.3/linbox/vector/stream.h:402:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					_r.random (*i);
data/linbox-1.6.3/linbox/vector/stream.h:476:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				_r.random (x);
data/linbox-1.6.3/linbox/vector/stream.h:537:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				_r.random (x);
data/linbox-1.6.3/linbox/vector/stream.h:605:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				_r.random (x);
data/linbox-1.6.3/linbox/vector/vector-domain.h:547:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Vector& random(Vector& v)
data/linbox-1.6.3/linbox/vector/vector-domain.h:552:54:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			for (iterator p = v.begin(); p != v.end(); ++p) r.random(*p);
data/linbox-1.6.3/tests/benchmark-fields.C:85:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	r.random( a ); r.random( b ); r.random( c );
data/linbox-1.6.3/tests/benchmark-fields.C:85:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	r.random( a ); r.random( b ); r.random( c );
data/linbox-1.6.3/tests/benchmark-fields.C:85:34:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	r.random( a ); r.random( b ); r.random( c );
data/linbox-1.6.3/tests/benchmark-fields.C:88:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r.random( dv1[(size_t)i] );
data/linbox-1.6.3/tests/benchmark-fields.C:89:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r.random( dv2[(size_t)i] );
data/linbox-1.6.3/tests/benchmark-fields.C:100:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		do { r.random( elements[(size_t)i] ); }
data/linbox-1.6.3/tests/matrix/randomans.h:43:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((unsigned)time(NULL));
data/linbox-1.6.3/tests/test-blackbox-block-container.C:206:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			rand.random(U.refEntry(i,j));
data/linbox-1.6.3/tests/test-blackbox-block-container.C:217:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			rand.random(V.refEntry(i,j));
data/linbox-1.6.3/tests/test-blackbox.h:196:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r.random (alpha);
data/linbox-1.6.3/tests/test-blas-domain.C:162:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-blas-domain.C:262:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		A.random();
data/linbox-1.6.3/tests/test-blas-domain.C:263:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		B.random();
data/linbox-1.6.3/tests/test-blas-domain.C:264:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		C.random();
data/linbox-1.6.3/tests/test-blas-domain.C:268:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			G.random(x[i]);
data/linbox-1.6.3/tests/test-blas-domain.C:269:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			G.random(y[i]);
data/linbox-1.6.3/tests/test-blas-domain.C:273:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		G.random(alpha);
data/linbox-1.6.3/tests/test-blas-domain.C:274:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		G.random(beta);
data/linbox-1.6.3/tests/test-blas-domain.C:454:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Arand.random<IMatrix>(A);
data/linbox-1.6.3/tests/test-blas-domain.C:455:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Brand.random<IMatrix>(B);
data/linbox-1.6.3/tests/test-blas-domain.C:456:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Crand.random<IMatrix>(C);
data/linbox-1.6.3/tests/test-blas-domain.C:460:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(i,j,Integer::random());
data/linbox-1.6.3/tests/test-blas-domain.C:461:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(i,j,Integer::random());
data/linbox-1.6.3/tests/test-blas-domain.C:462:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				C.setEntry(i,j,Integer::random());
data/linbox-1.6.3/tests/test-blas-domain.C:481:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		a = Integer::random<false>(ll) ; b = 1 ;
data/linbox-1.6.3/tests/test-blas-domain.C:483:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		a =Integer::random<false>(ll) ; b = -1 ;
data/linbox-1.6.3/tests/test-blas-domain.C:485:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		a =  1 ; b = Integer::random<false>(ll) ;
data/linbox-1.6.3/tests/test-blas-domain.C:487:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		a = -1 ; b = Integer::random<false>(ll) ;
data/linbox-1.6.3/tests/test-blas-domain.C:489:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		a = 0 ; b = Integer::random<false>(ll) ;
data/linbox-1.6.3/tests/test-blas-domain.C:491:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		a = Integer::random<false>(ll) ; b = 0 ;
data/linbox-1.6.3/tests/test-blas-domain.C:493:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		a = Integer::random<false>(ll) ; b = Integer::random<false>(ll) ;
data/linbox-1.6.3/tests/test-blas-domain.C:493:49:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		a = Integer::random<false>(ll) ; b = Integer::random<false>(ll) ;
data/linbox-1.6.3/tests/test-blas-domain.C:532:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	RandMat.random(A);
data/linbox-1.6.3/tests/test-blas-domain.C:533:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	RandMat.random(B);
data/linbox-1.6.3/tests/test-blas-domain.C:534:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	RandMat.random(C);
data/linbox-1.6.3/tests/test-blas-domain.C:546:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	do {R.random(alpha);} while (F.isZero(alpha)); // nonzerorandom
data/linbox-1.6.3/tests/test-blas-domain.C:549:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	R.random(beta);
data/linbox-1.6.3/tests/test-blas-domain.C:615:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	RandMat.random(A);
data/linbox-1.6.3/tests/test-blas-domain.C:616:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	RandMat.random(B);
data/linbox-1.6.3/tests/test-blas-domain.C:734:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r = (unsigned int)((size_t)random() % n);
data/linbox-1.6.3/tests/test-blas-domain.C:737:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			S.setEntry(i,i,Gn.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:739:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				S.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:747:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				L.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:748:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			L.setEntry(i,i,Gn.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:797:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		G.random(d);
data/linbox-1.6.3/tests/test-blas-domain.C:806:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				S.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:813:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				L.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:873:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			S.setEntry(i,i,Gn.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:875:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				S.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:882:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				L.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:958:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:962:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			F.init(b[i],G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:966:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			Au.setEntry(i,i,Gn.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:968:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				Au.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:974:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				Al.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:975:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			Al.setEntry(i,i,Gn.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1067:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1071:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			F.init(b[i],G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1077:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			S.setEntry(i,i,Gn.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1079:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				S.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1086:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				L.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1195:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(i,j,Gn.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1198:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			F.assign(a[i],Gn.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1299:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1317:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1336:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1355:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1374:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1392:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1411:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1430:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1483:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				  B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1491:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					C.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-blas-domain.C:1591:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		G.random(tmp);
data/linbox-1.6.3/tests/test-blas-domain.C:1682:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		G.random(tmp);
data/linbox-1.6.3/tests/test-blas-matrix.C:49:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	A.random();
data/linbox-1.6.3/tests/test-blas-matrix.C:80:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-butterfly.C:323:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned int) time (NULL));
data/linbox-1.6.3/tests/test-charpoly.C:321:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-companion.C:66:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned int) time (NULL));
data/linbox-1.6.3/tests/test-cra.C:102:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		residues[i] = Integer::random(PrimeSize-1);
data/linbox-1.6.3/tests/test-cra.C:175:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t resbits = 1 + (random() % (pprod.bitsize() - 1));
data/linbox-1.6.3/tests/test-cra.C:176:28:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Integer actual = Integer::random(resbits);
data/linbox-1.6.3/tests/test-cra.C:245:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t resbits = 1 + (random() % maxbits);
data/linbox-1.6.3/tests/test-cra.C:246:28:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Integer actual = Integer::random(resbits);
data/linbox-1.6.3/tests/test-cra.C:321:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			residues[i][j] = Integer::random(PrimeSize-1);
data/linbox-1.6.3/tests/test-cra.C:412:40:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				residues[k].setEntry( i,j,Integer::random(PrimeSize-1) );
data/linbox-1.6.3/tests/test-cra.C:506:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			residues[k][i] = Integer::random(PrimeSize-1) ;
data/linbox-1.6.3/tests/test-cra.C:578:32:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    Integer act_den = Integer::random(bitlen);
data/linbox-1.6.3/tests/test-cra.C:581:28:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        num_elt = Integer::random<false>(bitlen);
data/linbox-1.6.3/tests/test-cra.C:710:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			residues[k][i] = Integer::random(PrimeSize-1) ;
data/linbox-1.6.3/tests/test-cra.C:864:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((unsigned)time(NULL));             // seeding
data/linbox-1.6.3/tests/test-cradomain.C:75:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			Integer::random<false>(*it, s);
data/linbox-1.6.3/tests/test-dense-zero-one.C:106:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	void random( Block& B) {
data/linbox-1.6.3/tests/test-dense-zero-one.C:110:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				r.random(*place);
data/linbox-1.6.3/tests/test-dense-zero-one.C:128:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	MD.random(B); MD.random(C);
data/linbox-1.6.3/tests/test-dense-zero-one.C:128:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	MD.random(B); MD.random(C);
data/linbox-1.6.3/tests/test-dense-zero-one.C:157:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	MD.random(B); MD.random(D);
data/linbox-1.6.3/tests/test-dense-zero-one.C:157:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	MD.random(B); MD.random(D);
data/linbox-1.6.3/tests/test-dense-zero-one.C:163:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r.random(x);
data/linbox-1.6.3/tests/test-dense-zero-one.C:208:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	MD.random(B); MD.random(D);
data/linbox-1.6.3/tests/test-dense-zero-one.C:208:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	MD.random(B); MD.random(D);
data/linbox-1.6.3/tests/test-dense-zero-one.C:246:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	MD.random(B);
data/linbox-1.6.3/tests/test-dense-zero-one.C:255:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Block D(m,m); MD.random(D);
data/linbox-1.6.3/tests/test-dense-zero-one.C:279:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	MD.random(B);
data/linbox-1.6.3/tests/test-dense.C:102:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (v[(size_t)j]);
data/linbox-1.6.3/tests/test-dense.C:183:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				r.random (x[(size_t)j]);
data/linbox-1.6.3/tests/test-dense.C:210:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				r.random (v[(size_t)k]);
data/linbox-1.6.3/tests/test-det.C:93:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                do r.random (d[j]); while (F.isZero (d[j]));
data/linbox-1.6.3/tests/test-det.C:182:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            do r.random (d[j]); while (F.isZero (d[j]));
data/linbox-1.6.3/tests/test-det.C:270:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            r.random (d[j]);
data/linbox-1.6.3/tests/test-diagonal.C:326:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-dif.C:166:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r.random (d[i]);
data/linbox-1.6.3/tests/test-echelon-form.C:100:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r = (size_t)(random() % mn);
data/linbox-1.6.3/tests/test-echelon-form.C:103:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			S.setEntry(i,i,Gn.random(tmp));
data/linbox-1.6.3/tests/test-echelon-form.C:105:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				S.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-echelon-form.C:113:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				L.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-echelon-form.C:114:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			L.setEntry(i,i,Gn.random(tmp));
data/linbox-1.6.3/tests/test-echelon-form.C:188:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				  B.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-echelon-form.C:196:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					C.setEntry(i,j,G.random(tmp));
data/linbox-1.6.3/tests/test-echelon-form.C:300:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-ffpack.C:102:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			Gn.random(*(S+i*n+i));
data/linbox-1.6.3/tests/test-ffpack.C:104:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				G.random(*(S+i*n+j));
data/linbox-1.6.3/tests/test-ffpack.C:113:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				G.random(*(L+i*n+j));
data/linbox-1.6.3/tests/test-ffpack.C:114:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			Gn.random(*(L+i*n+i));
data/linbox-1.6.3/tests/test-ffpack.C:166:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		G.random(d);
data/linbox-1.6.3/tests/test-ffpack.C:181:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				G.random(*(S+i*n+j));
data/linbox-1.6.3/tests/test-ffpack.C:188:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				G.random(*(L+i*n+j));
data/linbox-1.6.3/tests/test-ffpack.C:253:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					Gn.random (*(B+i*m+j));
data/linbox-1.6.3/tests/test-ffpack.C:264:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					Gn.random (*(C+i*n+j));
data/linbox-1.6.3/tests/test-ffpack.C:397:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		G.random(tmp);
data/linbox-1.6.3/tests/test-ffpack.C:506:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		G.random(tmp);
data/linbox-1.6.3/tests/test-ffpack.C:572:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			Gn.random(*(S+i*(n+1)));
data/linbox-1.6.3/tests/test-ffpack.C:574:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				G.random(*(S+i*n+j));
data/linbox-1.6.3/tests/test-ffpack.C:581:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				G.random(*(L+i*n+j));
data/linbox-1.6.3/tests/test-ffpack.C:662:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			G.random(tmp);
data/linbox-1.6.3/tests/test-ffpack.C:663:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			if ( Z2.isZero(G2.random(tmp2) ) )
data/linbox-1.6.3/tests/test-ffpack.C:673:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				G.random(*(A+i*n+j));
data/linbox-1.6.3/tests/test-ffpack.C:707:37:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	static size_t n = 130+(size_t)(130*drand48());
data/linbox-1.6.3/tests/test-ffpack.C:708:37:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	static size_t m = 130+(size_t)(130*drand48());
data/linbox-1.6.3/tests/test-ffpack.C:736:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-ffpack.C:761:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-ffpack.C:784:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-ffpack.C:807:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-ffpack.C:829:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-ffpack.C:853:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-ffpack.C:875:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-ffpack.C:898:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-fibb.C:96:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	X.random();
data/linbox-1.6.3/tests/test-fibb.C:147:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	X.random();
data/linbox-1.6.3/tests/test-fibb.C:247:37:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Permutation<Field> P2(F, n, n); P2.random(); 
data/linbox-1.6.3/tests/test-field.h:214:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        r.random(a);
data/linbox-1.6.3/tests/test-field.h:408:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (a);
data/linbox-1.6.3/tests/test-field.h:461:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			do r.random (a); while (F.isZero (a));
data/linbox-1.6.3/tests/test-field.h:516:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (a);
data/linbox-1.6.3/tests/test-field.h:517:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (b);
data/linbox-1.6.3/tests/test-field.h:518:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (c);
data/linbox-1.6.3/tests/test-field.h:590:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (a);
data/linbox-1.6.3/tests/test-field.h:591:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (b);
data/linbox-1.6.3/tests/test-field.h:660:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (a);
data/linbox-1.6.3/tests/test-field.h:661:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (b);
data/linbox-1.6.3/tests/test-field.h:662:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (c);
data/linbox-1.6.3/tests/test-field.h:817:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (a);
data/linbox-1.6.3/tests/test-field.h:880:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (a);
data/linbox-1.6.3/tests/test-field.h:881:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (b);
data/linbox-1.6.3/tests/test-field.h:954:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (a);
data/linbox-1.6.3/tests/test-field.h:955:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (b);
data/linbox-1.6.3/tests/test-field.h:1034:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (a); r.random (b);
data/linbox-1.6.3/tests/test-field.h:1034:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (a); r.random (b);
data/linbox-1.6.3/tests/test-field.h:1180:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (a);
data/linbox-1.6.3/tests/test-field.h:1181:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (x);
data/linbox-1.6.3/tests/test-field.h:1182:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (y);
data/linbox-1.6.3/tests/test-field.h:1233:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (a);
data/linbox-1.6.3/tests/test-field.h:1311:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	r.random(a); r.random(b);
data/linbox-1.6.3/tests/test-field.h:1311:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	r.random(a); r.random(b);
data/linbox-1.6.3/tests/test-field.h:1382:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			F.convert(ix, iter.random (x));
data/linbox-1.6.3/tests/test-frobenius-large.C:115:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(seed);
data/linbox-1.6.3/tests/test-frobenius-small.C:72:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(seed);
data/linbox-1.6.3/tests/test-frobenius.C:74:37:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	for ( size_t i=0; i < pdeg; ++i) r.random(plist[0][i]);
data/linbox-1.6.3/tests/test-frobenius.C:79:37:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	for ( size_t i=0; i < pdeg; ++i) r.random(plist[1][i]);
data/linbox-1.6.3/tests/test-frobenius.C:84:37:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	for ( size_t i=0; i < pdeg; ++i) r.random(plist[2][i]);
data/linbox-1.6.3/tests/test-ftrmm.C:67:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t M    = random()%(_LB_MAX_SZ/2) ;
data/linbox-1.6.3/tests/test-ftrmm.C:68:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t N    = random()%(_LB_MAX_SZ/2) ; // B is £MxN£ in a £ldb x rows£ table
data/linbox-1.6.3/tests/test-ftrmm.C:69:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t ldb  = random()%_LB_MAX_SZ ;
data/linbox-1.6.3/tests/test-ftrmm.C:70:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t lda  = random()%_LB_MAX_SZ ;
data/linbox-1.6.3/tests/test-ftrmm.C:72:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	while (ldb<N) ldb = random()%_LB_MAX_SZ; // £ldb >= N£
data/linbox-1.6.3/tests/test-ftrmm.C:79:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	while (lda<K) lda = random()%_LB_MAX_SZ; // £ldba>= N£
data/linbox-1.6.3/tests/test-ftrmm.C:110:44:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	for (size_t i = 0 ; i < rows*lda ; ++i) G.random( *(A+i) ) ;
data/linbox-1.6.3/tests/test-ftrmm.C:118:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	for (size_t i = 0 ; i < rows*ldb  ; ++i) G.random( *(B+i) ) ;
data/linbox-1.6.3/tests/test-ftrmm.C:128:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Gn.random(alpha);
data/linbox-1.6.3/tests/test-ftrmm.C:383:39:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		for (size_t i = 0 ; i < K ; ++i) Gn.random(*(A+i*(lda+1))) ; // invertible diag !
data/linbox-1.6.3/tests/test-ftrmm.C:418:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t M    = random()%_LB_MAX_SZ+1 ;
data/linbox-1.6.3/tests/test-ftrmm.C:419:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t N    = random()%_LB_MAX_SZ+1 ;
data/linbox-1.6.3/tests/test-ftrmm.C:420:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t lda  = random()%_LB_MAX_SZ+1 ;
data/linbox-1.6.3/tests/test-ftrmm.C:441:41:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	for (size_t i = 0 ; i < M*lda ; ++i) G.random( *(A+i) ) ;
data/linbox-1.6.3/tests/test-ftrmm.C:447:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t r = (size_t)random()%M ;
data/linbox-1.6.3/tests/test-ftrmm.C:449:52:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		P[i] = i + (size_t)((double)(M-i)*( (std::max(0.,drand48()-1e-6)))); // histoire de pas tomber sur 1...
data/linbox-1.6.3/tests/test-ftrmm.C:475:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	r = (size_t)random()%N ;
data/linbox-1.6.3/tests/test-ftrmm.C:477:51:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Q[i] = i + (size_t)((double)(N-i)*( std::max(0.,drand48()-1e-6)) );
data/linbox-1.6.3/tests/test-ftrmm.C:510:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t M    = random()%_LB_MAX_SZ+1 ; // rows of (t)A and C
data/linbox-1.6.3/tests/test-ftrmm.C:511:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t N    = random()%_LB_MAX_SZ+1 ; // cols of (t)B and C
data/linbox-1.6.3/tests/test-ftrmm.C:512:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t K    = random()%_LB_MAX_SZ+1 ; // cols of (t)A, rows of (t)B
data/linbox-1.6.3/tests/test-ftrmm.C:516:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t lda  = random()%(_LB_MAX_SZ/2) ;
data/linbox-1.6.3/tests/test-ftrmm.C:518:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t ldb  = random()%(_LB_MAX_SZ/2) ;
data/linbox-1.6.3/tests/test-ftrmm.C:520:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	size_t ldc  = N+random()%(_LB_MAX_SZ/2) ;
data/linbox-1.6.3/tests/test-ftrmm.C:546:28:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	alpha = (Element)Integer::random<false>(2);
data/linbox-1.6.3/tests/test-ftrmm.C:547:27:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (abs(alpha) > 1.5 ) G.random(alpha);
data/linbox-1.6.3/tests/test-ftrmm.C:549:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	beta  = Integer::random<false>(2);
data/linbox-1.6.3/tests/test-ftrmm.C:550:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (abs(beta) >1.5 ) G.random(beta);
data/linbox-1.6.3/tests/test-ftrmm.C:566:44:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	for (size_t i = 0 ; i < rowA*lda ; ++i) G.random( *(A+i) ) ;
data/linbox-1.6.3/tests/test-ftrmm.C:567:44:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	for (size_t i = 0 ; i < rowB*ldb ; ++i) G.random( *(B+i) ) ;
data/linbox-1.6.3/tests/test-ftrmm.C:568:44:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	for (size_t i = 0 ; i < rowC*ldc ; ++i) G.random( *(C+i) ) ;
data/linbox-1.6.3/tests/test-ftrmm.C:654:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((unsigned int)time(NULL));
data/linbox-1.6.3/tests/test-hadamard-bound.C:100:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(*seed);
data/linbox-1.6.3/tests/test-hadamard-bound.C:109:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    b.random(randIter);
data/linbox-1.6.3/tests/test-hilbert.C:68:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-invariant-factors.C:92:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(seed);
data/linbox-1.6.3/tests/test-inverse.C:428:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random (x);
data/linbox-1.6.3/tests/test-inverse.C:465:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-isposdef.C:120:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-ispossemidef.C:129:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-local-smith-form-sparseelim.C:185:10:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    std::srand(seed);
data/linbox-1.6.3/tests/test-local-smith-form-sparseelim.C:216:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                G.random (L.refEntry(l,j));
data/linbox-1.6.3/tests/test-local-smith-form-sparseelim.C:228:41:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            if (nonzero(gen)<density) G.random ( U.refEntry(i,j) );
data/linbox-1.6.3/tests/test-local-smith-form-sparseelim.C:322:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            Integer::random(iq,std::max(q,Integer(131071)));
data/linbox-1.6.3/tests/test-matpoly-mult.C:65:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r.random(v[i]); 
data/linbox-1.6.3/tests/test-matpoly-mult.C:72:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			r.random(m.refEntry(i,j));
data/linbox-1.6.3/tests/test-matrix-domain.h:163:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	A.random(); B.random();
data/linbox-1.6.3/tests/test-matrix-domain.h:163:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	A.random(); B.random();
data/linbox-1.6.3/tests/test-matrix-utils.h:186:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Gn.random(*(B+j*m+j));
data/linbox-1.6.3/tests/test-matrix-utils.h:188:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			G.random (*(B+i*m+j));
data/linbox-1.6.3/tests/test-matrix-utils.h:196:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			Gn.random (*(C+i*n+j));
data/linbox-1.6.3/tests/test-matrix-utils.h:255:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Gn.random(*(B+j*m+j) );
data/linbox-1.6.3/tests/test-matrix-utils.h:257:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			G.random (*(B+i*m+j));
data/linbox-1.6.3/tests/test-matrix-utils.h:284:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			G.random (*(C+i*m+j));
data/linbox-1.6.3/tests/test-moore-penrose.C:80:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		rnd.random (x);
data/linbox-1.6.3/tests/test-moore-penrose.C:359:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-mpi-comm.C:77:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    RDM.random(A);
data/linbox-1.6.3/tests/test-mpi-comm.C:85:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    B.random(RI);
data/linbox-1.6.3/tests/test-mpi-comm.C:203:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        srand(seed);
data/linbox-1.6.3/tests/test-opencl-domain.C:127:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:128:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:177:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A_b.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:178:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:229:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:230:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B_b.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:283:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:284:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:285:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				C.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:335:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:336:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:337:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				C_b.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:390:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:391:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:392:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				C.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:442:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:443:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:444:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				C_b.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:497:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:498:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:499:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				C.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:549:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:550:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:551:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				C_b.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:604:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:605:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:606:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				C.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:679:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:680:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:681:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				C_b.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:733:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				A.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:734:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				B.setEntry(k,j,G.random(tmp));
data/linbox-1.6.3/tests/test-opencl-domain.C:859:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((unsigned)time(NULL));
data/linbox-1.6.3/tests/test-order-basis.C:82:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				Gen.random(Serie.ref(i,j,k));
data/linbox-1.6.3/tests/test-permutation.C:112:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-permutation.C:121:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	P.random();
data/linbox-1.6.3/tests/test-qlup.C:89:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			generator.random (*it);
data/linbox-1.6.3/tests/test-qlup.C:193:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			generator.random (*it);
data/linbox-1.6.3/tests/test-qlup.C:285:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			generator.random (*it);
data/linbox-1.6.3/tests/test-qlup.C:353:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned int)rseed);
data/linbox-1.6.3/tests/test-quad-matrix.C:67:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned int)time (NULL));
data/linbox-1.6.3/tests/test-randiter-nonzero-prime.C:80:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		rp.random (x);
data/linbox-1.6.3/tests/test-randiter-nonzero-prime.C:200:7:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	std::srand(rseed);
data/linbox-1.6.3/tests/test-rank-Int.C:54:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-rank-md.C:61:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-rank-u32.C:58:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-rank.h:186:9:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				if (drand48()<sparsity) {
data/linbox-1.6.3/tests/test-scalar-matrix.C:65:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-serialization.C:158:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    RandMat.random(denseMatrix);
data/linbox-1.6.3/tests/test-serialization.C:200:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(seed);
data/linbox-1.6.3/tests/test-smith-form-local.C:173:7:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	std::srand(rseed);
data/linbox-1.6.3/tests/test-smith-form-local.C:212:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r.random(e);
data/linbox-1.6.3/tests/test-smith-form-local.C:213:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		do { r.random(e); } while (R.isZero(e));
data/linbox-1.6.3/tests/test-solve-full.C:71:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            RDM.random(A);
data/linbox-1.6.3/tests/test-solve-full.C:83:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            b.random(vectorRandIter);
data/linbox-1.6.3/tests/test-solve-full.C:87:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            x.random(vectorRandIter);
data/linbox-1.6.3/tests/test-sparse.C:144:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(0);
data/linbox-1.6.3/tests/test-sparse.C:155:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		while (S1.field().isZero(r.random(x)));
data/linbox-1.6.3/tests/test-submatrix.C:95:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					r.random (x);
data/linbox-1.6.3/tests/test-sum.C:186:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		r.random (d[i]);
data/linbox-1.6.3/tests/test-toeplitz-det.C:70:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((unsigned)time(0));
data/linbox-1.6.3/tests/test-toeplitz-det.C:89:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		randit.random(temp);
data/linbox-1.6.3/tests/test-toeplitz.C:50:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			_RI.random(c);
data/linbox-1.6.3/tests/test-toeplitz.C:58:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            _RI.random(e);
data/linbox-1.6.3/tests/test-toom-cook.C:240:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		randomizer.random(A);
data/linbox-1.6.3/tests/test-toom-cook.C:242:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		randomizer.random(B);
data/linbox-1.6.3/tests/test-toom-cook.C:301:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		A.random((unsigned)b);
data/linbox-1.6.3/tests/test-toom-cook.C:302:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		B.random((unsigned)b);
data/linbox-1.6.3/tests/test-toom-cook.C:378:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		x.random(ri);
data/linbox-1.6.3/tests/test-transpose.C:89:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	VD.random(x);
data/linbox-1.6.3/tests/test-transpose.C:96:5:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	VD.random(y);
data/linbox-1.6.3/tests/test-triplesbb-omp.C:391:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-triplesbb.C:92:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand ((unsigned)time (NULL));
data/linbox-1.6.3/tests/test-triplesbb.C:114:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	X.random(); Z.random();
data/linbox-1.6.3/tests/test-triplesbb.C:114:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	X.random(); Z.random();
data/linbox-1.6.3/tests/test-vector-domain.h:177:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		do r.random (a); while (F.isZero (a));
data/linbox-1.6.3/tests/test-vector-domain.h:279:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		do r.random (a); while (F.isZero (a));
data/linbox-1.6.3/tests/test-vector-domain.h:379:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		do r.random (a); while (F.isZero (a));
data/linbox-1.6.3/benchmarks/benchmark-order-basis.C:68:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fd = open( "/proc/self/psinfo", O_RDONLY )) == -1 )
data/linbox-1.6.3/benchmarks/benchmark-order-basis.C:118:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fp = fopen( "/proc/self/statm", "r" )) == NULL )
data/linbox-1.6.3/benchmarks/benchmark-utils.C:296:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer [80];
data/linbox-1.6.3/examples/bench-fft.C:239:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	uint64_t bits =atoi(argv[1]);
data/linbox-1.6.3/examples/bench-fft.C:240:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	long seed=((argc>2)?atoi(argv[2]):time(NULL));	
data/linbox-1.6.3/examples/bench-new-fft.C:263:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	long seed=((argc>2)?atoi(argv[2]):time(NULL));
data/linbox-1.6.3/examples/bigmat.C:48:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int n = atoi(argv[1]);
data/linbox-1.6.3/examples/blackbox/load-det.C:67:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (argc == 3) q = atoi(argv[2]);
data/linbox-1.6.3/examples/blackbox/smith.C:82:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int m = atoi(argv[2]);
data/linbox-1.6.3/examples/blackbox/smith.C:84:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int n = atoi(argv[3]);
data/linbox-1.6.3/examples/blassolve.C:52:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        invect.open (argv[2], std::ifstream::in);
data/linbox-1.6.3/examples/genprime.C:12:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    for (int i=0; i < atoi(argv[1]);i++){
data/linbox-1.6.3/examples/grid_reduce.C:67:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int S = atoi(argv[4]);
data/linbox-1.6.3/examples/grid_reduce.C:105:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	   mRow.open("mC2", ios::in) ;
data/linbox-1.6.3/examples/grid_reduce.C:197:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		in.open(src.c_str(), std::ios::in);
data/linbox-1.6.3/examples/grid_reduce.C:199:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		os.open(out3.c_str(), std::ios::out);
data/linbox-1.6.3/examples/grid_reduce.C:287:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		in.open(src.c_str(), std::ios::in);
data/linbox-1.6.3/examples/grid_reduce.C:289:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		os.open(out4.c_str(), std::ios::out);
data/linbox-1.6.3/examples/grid_reduce.C:387:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		in.open(src.c_str(), std::ios::in);
data/linbox-1.6.3/examples/grid_reduce.C:389:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		os.open(out2.c_str(), std::ios::out);
data/linbox-1.6.3/examples/mats.C:90:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int n = atoi(argv[2]);
data/linbox-1.6.3/examples/nullspacebasis.C:51:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	Field F(atoi(argv[2]),argc>3?atoi(argv[3]):1);
data/linbox-1.6.3/examples/nullspacebasis.C:51:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	Field F(atoi(argv[2]),argc>3?atoi(argv[3]):1);
data/linbox-1.6.3/examples/nullspacebasis_rank.C:50:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int pVal = atoi(argv[2]);
data/linbox-1.6.3/examples/nullspacebasis_rank.C:55:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  Field F(pVal, argc>3?atoi(argv[3]):1);
data/linbox-1.6.3/examples/omp_block_rank.C:236:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	unsigned long seed = (argc>4?atoi(argv[4]):0);
data/linbox-1.6.3/examples/omp_block_rank.C:255:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int nb = (argc>3 ? atoi(argv[3]) : omp_get_max_threads() );
data/linbox-1.6.3/examples/omp_block_rank.C:546:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int c = (argc>2 ? atoi(argv[2]) : 65521);
data/linbox-1.6.3/examples/poly-smith.C:89:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int p = atoi(argv[1]);
data/linbox-1.6.3/examples/poly-smith.C:90:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int n = atoi(argv[2]);
data/linbox-1.6.3/examples/poly-smith.C:91:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int d = atoi(argv[3]);
data/linbox-1.6.3/examples/power_rank.C:69:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    size_t StPr( argc>5? atoi(argv[5]): 0);
data/linbox-1.6.3/examples/power_rank.C:115:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    size_t method( argc>4? atoi(argv[4]) : 0);
data/linbox-1.6.3/examples/poweroftwo_ranks.C:105:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int method( argc>3? atoi(argv[3]): 0 );
data/linbox-1.6.3/examples/poweroftwo_ranks.C:108:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int exponent = atoi(argv[2]);
data/linbox-1.6.3/examples/poweroftwo_ranks.C:113:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    size_t StPr( argc>4? atoi(argv[4]): 0);
data/linbox-1.6.3/examples/qchar.C:172:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	size_t n = atoi(argv[1]);
data/linbox-1.6.3/examples/qchar.C:379:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char xstr[500];
data/linbox-1.6.3/examples/qchar.C:380:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char numstr[500];
data/linbox-1.6.3/examples/qchar.C:383:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(xstr, "%100f", x);
data/linbox-1.6.3/examples/qchar.C:404:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tenstr[500];
data/linbox-1.6.3/examples/rank.C:87:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		uint32_t q = atoi(argv[2]);
data/linbox-1.6.3/examples/samplebb.C:103:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		R.init(a, -atoi(code));
data/linbox-1.6.3/examples/samplebb.C:109:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int n = atoi(code+1);
data/linbox-1.6.3/examples/samplebb.C:239:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		augmentBB(L, avp[i], atoi(avp[i+1]), atoi(avp[i+2]), Z);
data/linbox-1.6.3/examples/samplebb.C:239:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		augmentBB(L, avp[i], atoi(avp[i+1]), atoi(avp[i+2]), Z);
data/linbox-1.6.3/examples/smith.C:108:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	unsigned long m = 1; if (argc == 4) m = atoi(argv[3]);
data/linbox-1.6.3/examples/smithsparse.C:90:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		unsigned long m = atoi(argv[2]);
data/linbox-1.6.3/examples/solve.C:70:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		invect.open (argv[2], std::ifstream::in);
data/linbox-1.6.3/examples/solve.C:83:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		invect.open (argv[2], std::ifstream::in);
data/linbox-1.6.3/examples/solve.C:93:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        std::cout<<"Computation is done over Z/("<<atoi(argv[ModComp])<<")"<<std::endl;
data/linbox-1.6.3/examples/solver/t-rdisolve.C:152:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		inA.open("td-A.txt");
data/linbox-1.6.3/examples/solver/t-rdisolve.C:160:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		inb.open("td-b.txt");
data/linbox-1.6.3/examples/solver/t-rdisolve.C:497:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		in.open("td-b.txt");
data/linbox-1.6.3/examples/solver/t-rdisolve.C:501:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		in2.open("td-A.txt");
data/linbox-1.6.3/examples/solverat.C:67:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		invect.open (argv[2], std::ifstream::in);
data/linbox-1.6.3/examples/sparsesolverat.C:59:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		invect.open (argv[2], std::ifstream::in);
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:581:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char MapleStatement[100] = "rtable(1..";
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:614:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->rowdim() );
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:615:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	     strcat(MapleStatement, ",1..");
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:617:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->coldim() );
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:618:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	     strcat(MapleStatement, ", subtype=Matrix, storage=sparse);");
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:639:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->rowdim() );
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:640:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	     strcat(MapleStatement, ", 1..");
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:641:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->coldim() );
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:642:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	     strcat(MapleStatement, ", subtype=Matrix, storage=sparse);");
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:770:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char MapleStatement[100] = "rtable(1..";
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:801:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", V->size() );
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:802:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	     strcat(MapleStatement, ", subtype=Vector[column], storage=sparse)");
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:818:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", V->size() );
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:819:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	     strcat(MapleStatement, ",subtype=Vector[column], storage=sparse)");
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[out.str().length()];
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:202:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[out.str().length()];
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:279:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[out.str().length()];
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:349:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[out.str().length()];
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:419:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[out.str().length()];
data/linbox-1.6.3/linbox/algorithms/numeric-solver-lapack.h:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)_IM, thedata, sizeof(double)*_m*_n);
data/linbox-1.6.3/linbox/algorithms/rational-solver2.h:212:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy ((void*)IM, (const void*)M, sizeof(double)*(size_t)(n*n));
data/linbox-1.6.3/linbox/algorithms/rational-solver2.h:247:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy ((void*) r, (const void*) b, sizeof(double)*(size_t)n);
data/linbox-1.6.3/linbox/blackbox/apply.h:224:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(&tmp,ptr,sizeof(long long));
data/linbox-1.6.3/linbox/blackbox/apply.h:226:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(ptr,&tmp,sizeof(long long));
data/linbox-1.6.3/linbox/blackbox/apply.h:235:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(&tmp,ptr,sizeof(long long));
data/linbox-1.6.3/linbox/blackbox/apply.h:237:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(ptr,&tmp,sizeof(long long));
data/linbox-1.6.3/linbox/blackbox/apply.h:636:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(&tmp,bitDest,sizeof(long long));
data/linbox-1.6.3/linbox/blackbox/apply.h:638:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(bitDest,&tmp,sizeof(long long));
data/linbox-1.6.3/linbox/blackbox/apply.h:751:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(&tmp,BitDest,sizeof(long long));
data/linbox-1.6.3/linbox/blackbox/apply.h:753:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(BitDest,&tmp,sizeof(long long));
data/linbox-1.6.3/linbox/blackbox/apply.h:994:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(&tmp,bitDest,sizeof(long long));
data/linbox-1.6.3/linbox/blackbox/apply.h:996:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(bitDest,&tmp,sizeof(long long));
data/linbox-1.6.3/linbox/blackbox/zero-one.h:174:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[80];
data/linbox-1.6.3/linbox/field/gmp-rational.h:647:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buffer[65535], endc;
data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain-factory.h:166:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char chBuffer[256];
data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:136:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(_rep, B._rep, sizeof(Entry)*_rows*_cols);
data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:139:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(_rep + i*_stride, B._rep + i*B._stride, sizeof(Entry)*_cols);
data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:250:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&(_rep[i*_stride]), perm_row, coldim()*sizeof(Entry));	
data/linbox-1.6.3/linbox/util/error.h:66:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char strg[max_error_string];
data/linbox-1.6.3/tests/test-dense.C:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[80];
data/linbox-1.6.3/tests/test-dense.C:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[80];
data/linbox-1.6.3/tests/test-solve-nonsingular.C:262:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	mat.open(file.c_str());
data/linbox-1.6.3/tests/test-solve-nonsingular.C:270:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	out.open(res.c_str());
data/linbox-1.6.3/benchmarks/benchmark-example.C:212:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	Mat.read(mat1);
data/linbox-1.6.3/benchmarks/benchmark-order-basis.C:70:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ( read( fd, &psinfo, sizeof(psinfo) ) != sizeof(psinfo) )
data/linbox-1.6.3/benchmarks/block-coppersmith-benchmark.C:72:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		M.read(iF);
data/linbox-1.6.3/benchmarks/block-coppersmith-benchmark.C:78:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		U.read(iF);
data/linbox-1.6.3/benchmarks/block-coppersmith-benchmark.C:83:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		V.read(iF);
data/linbox-1.6.3/benchmarks/invariant-factors-benchmark.C:162:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		M.read(iF);
data/linbox-1.6.3/benchmarks/invariant-factors-benchmark.C:168:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		U.read(iF);
data/linbox-1.6.3/benchmarks/invariant-factors-benchmark.C:173:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		V.read(iF);
data/linbox-1.6.3/examples/athadet.C:69:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		sparseMatrix.read(input);
data/linbox-1.6.3/examples/blackbox/ex-mat0.C:78:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        A.read(in_stream);
data/linbox-1.6.3/examples/blackbox/example.C:147:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	A.read (input);
data/linbox-1.6.3/examples/blackbox/load-det.C:78:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	A.read (input); // size is determined by the input.
data/linbox-1.6.3/examples/blackbox/load-minpoly.C:98:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	A.read (input);
data/linbox-1.6.3/examples/blackbox/load-symmetrize.C:78:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	A.read (input);
data/linbox-1.6.3/examples/charpoly.C:118:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		A.read (input);
data/linbox-1.6.3/examples/charpoly.C:155:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		B.read (input);
data/linbox-1.6.3/examples/det.C:64:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		DenseMatrix<Integers> A(ZZ); A.read(input);
data/linbox-1.6.3/examples/det.C:84:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		SparseMatrix<Field> B (F); B.read(input);
data/linbox-1.6.3/examples/echelon.C:56:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	A.read(input);
data/linbox-1.6.3/examples/fields/ex-fields-archetype.C:60:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	K.read(std::cin,a);
data/linbox-1.6.3/examples/fields/ex-fields-archetype.C:61:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	K.read(std::cin,b);
data/linbox-1.6.3/examples/fields/ex-fields.C:59:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	K.read(cin,a);  K.read(cin,b);
data/linbox-1.6.3/examples/fields/ex-fields.C:59:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	K.read(cin,a);  K.read(cin,b);
data/linbox-1.6.3/examples/find-invariant-factors.C:52:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		M.read(iF);
data/linbox-1.6.3/examples/gf3-invariant-factors.C:35:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		F.read(is,d);
data/linbox-1.6.3/examples/graph-charpoly.C:86:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	A.read (input);
data/linbox-1.6.3/examples/grid_reduce.C:205:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		A.read(Z,in, mC, mR);
data/linbox-1.6.3/examples/grid_reduce.C:296:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		A.read(Z,in, mR, mC);
data/linbox-1.6.3/examples/grid_reduce.C:395:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		A.read(Z,in, mC, mR);
data/linbox-1.6.3/examples/invariant-factors.C:73:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		M.read(iF);
data/linbox-1.6.3/examples/map-sparse.h:141:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::istream& read(std::istream& in);
data/linbox-1.6.3/examples/mats.C:353:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			M.read(cin);
data/linbox-1.6.3/examples/minpoly.C:88:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		B.read (input);
data/linbox-1.6.3/examples/minpoly.C:120:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		B.read (input);
data/linbox-1.6.3/examples/mpidet.C:70:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		A.read(input);
data/linbox-1.6.3/examples/nullspacebasis.C:53:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	B.read (input);
data/linbox-1.6.3/examples/nullspacebasis_rank.C:57:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  A.read (input);
data/linbox-1.6.3/examples/qchar.C:406:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (prec < strlen(tenstr)) {
data/linbox-1.6.3/examples/qchar.C:407:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				int cut = strlen(tenstr)-prec;
data/linbox-1.6.3/examples/qchar.C:410:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				numstr[strlen(numstr)-cut]=0;//temp round down
data/linbox-1.6.3/examples/qchar.C:424:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (i >=strlen(xstr)) break;
data/linbox-1.6.3/examples/qchar.C:430:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (i < strlen(xstr)) {
data/linbox-1.6.3/examples/qchar.C:437:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (i < strlen(xstr)) {
data/linbox-1.6.3/examples/qchar.C:445:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (i >=strlen(xstr)) break;
data/linbox-1.6.3/examples/qchar.C:450:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (i < strlen(xstr)) {
data/linbox-1.6.3/examples/qchar.C:456:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						if (i >=strlen(xstr)) break;
data/linbox-1.6.3/examples/qchar.C:474:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (j >= strlen(xstr)) break;
data/linbox-1.6.3/examples/qchar.C:478:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (j < strlen(xstr)) {
data/linbox-1.6.3/examples/qchar.C:483:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (j >= strlen(xstr)) break;
data/linbox-1.6.3/examples/qchar.C:488:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (j < strlen(xstr)) {
data/linbox-1.6.3/examples/smith.C:259:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (src[0]=='-') M.read(cin);
data/linbox-1.6.3/examples/smith.C:262:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		M.read(in);
data/linbox-1.6.3/examples/smithsparse.C:103:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			B.read(input);
data/linbox-1.6.3/examples/smithsparse.C:155:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		A.read(input);
data/linbox-1.6.3/examples/solve.C:117:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				F.read(invect,*it);
data/linbox-1.6.3/examples/solver/t-rdisolve.C:153:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		A.read(inA);
data/linbox-1.6.3/examples/sparseelimdet.C:64:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		A.read(input);
data/linbox-1.6.3/examples/sparseelimdet.C:78:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		B.read(input);
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:614:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->rowdim() );
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:617:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->coldim() );
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:639:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->rowdim() );
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:641:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->coldim() );
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:801:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", V->size() );
data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:818:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sprintf(MapleStatement + strlen(MapleStatement), "%d", V->size() );
data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:75:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(msg, out.str().c_str(), l);
data/linbox-1.6.3/interfaces/maple/lb-maple.C:72:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(msg, out.str().c_str(), l);
data/linbox-1.6.3/linbox/algorithms/block-massey-domain.h:163:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				for (int i=(int)strlen(timer); i<28; i++)
data/linbox-1.6.3/linbox/algorithms/cra-builder-single.h:330:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				for (int i=strlen(title)+strlen(pref); i<28; i++)
data/linbox-1.6.3/linbox/algorithms/cra-builder-single.h:330:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				for (int i=strlen(title)+strlen(pref); i<28; i++)
data/linbox-1.6.3/linbox/algorithms/rational-solver.h:359:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				for (int i=strlen(title)+strlen(pref); i<28; i++)
data/linbox-1.6.3/linbox/algorithms/rational-solver.h:359:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				for (int i=strlen(title)+strlen(pref); i<28; i++)
data/linbox-1.6.3/linbox/algorithms/rational-solver.h:544:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				for (int i=strlen(title)+strlen(pref); i<28; i++)
data/linbox-1.6.3/linbox/algorithms/rational-solver.h:544:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				for (int i=strlen(title)+strlen(pref); i<28; i++)
data/linbox-1.6.3/linbox/algorithms/rational-solver.h:858:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				for (int i=strlen(title)+strlen(pref); i<28; i++)
data/linbox-1.6.3/linbox/algorithms/rational-solver.h:858:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				for (int i=strlen(title)+strlen(pref); i<28; i++)
data/linbox-1.6.3/linbox/algorithms/sigma-basis.h:97:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				for (int i=strlen(timer); i<28; i++)
data/linbox-1.6.3/linbox/algorithms/smith-form-valence.h:87:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	A.read(input);
data/linbox-1.6.3/linbox/blackbox/bb.h:48:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	virtual std::istream& read(std::istream& os) 
data/linbox-1.6.3/linbox/blackbox/csf.h:113:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			read(ms);
data/linbox-1.6.3/linbox/blackbox/csf.h:249:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		void read(MatrixStream<Field> &ms)
data/linbox-1.6.3/linbox/blackbox/diagonal.h:211:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read(std::istream& is)
data/linbox-1.6.3/linbox/blackbox/fibb-product.h:45:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::istream& read(std::istream& is);
data/linbox-1.6.3/linbox/blackbox/fibb-product.h:147:1:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
read(std::istream& is) 
data/linbox-1.6.3/linbox/blackbox/hilbert.h:124:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read(std::istream& is)
data/linbox-1.6.3/linbox/blackbox/matrix-blackbox.h:174:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		inline std::istream &read (std::istream &is)
data/linbox-1.6.3/linbox/blackbox/matrix-blackbox.h:175:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		{ return _MD.read (is, _matA); }
data/linbox-1.6.3/linbox/blackbox/permutation.h:348:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read(std::istream &os)
data/linbox-1.6.3/linbox/blackbox/permutation.h:349:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		{ return read(os, Tag::FileFormat::Plain); }
data/linbox-1.6.3/linbox/blackbox/permutation.h:429:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read(std::istream &is, Tag::FileFormat format)
data/linbox-1.6.3/linbox/blackbox/quad-matrix.h:204:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is)
data/linbox-1.6.3/linbox/blackbox/scalar-matrix.h:232:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read(std::istream& is) {
data/linbox-1.6.3/linbox/blackbox/submatrix.h:361:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream& is)
data/linbox-1.6.3/linbox/blackbox/submatrix.h:364:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			BlasSubmatrix<Matrix>::read (is, f);
data/linbox-1.6.3/linbox/blackbox/toeplitz.h:131:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(std::istream & in)
data/linbox-1.6.3/linbox/blackbox/transpose.h:175:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read(std::istream & is) {
data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h:298:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read(std::istream &is)
data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h:300:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read(std::istream &is) const
data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h:302:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read(std::istream &is, Tag::FileFormat format) const
data/linbox-1.6.3/linbox/blackbox/zero-one.h:168:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is)
data/linbox-1.6.3/linbox/blackbox/zo-gf2.h:121:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is) ;
data/linbox-1.6.3/linbox/blackbox/zo.h:301:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is)
data/linbox-1.6.3/linbox/field/abstract.h:491:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		virtual std::istream &read (std::istream &is, Element &x) const = 0;
data/linbox-1.6.3/linbox/field/abstract.h:499:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		virtual std::istream &read(std::istream &is, Element &e) const = 0;
data/linbox-1.6.3/linbox/field/archetype.h:707:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is, Element &x) const
data/linbox-1.6.3/linbox/field/archetype.h:708:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		{ return _field_ptr->read (is, *x._elem_ptr); }
data/linbox-1.6.3/linbox/field/envelope.h:632:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream& is, ElementAbstract& x) const
data/linbox-1.6.3/linbox/field/envelope.h:633:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		{ return _field.read (is, static_cast<ElementEnvelope<Field>&> (x)._elem); }
data/linbox-1.6.3/linbox/field/envelope.h:655:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read(istream &is, ElementAbstract &x) const
data/linbox-1.6.3/linbox/field/envelope.h:657:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return _field.read(is, static_cast<ElementEnvelope<Field>&>(x)._elem);
data/linbox-1.6.3/linbox/field/gf2.h:381:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is)
data/linbox-1.6.3/linbox/field/gf2.h:405:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is, Element &x) const
data/linbox-1.6.3/linbox/field/gf2.h:414:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is, BitVector::reference x) const
data/linbox-1.6.3/linbox/field/gf2.h:423:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is, stdBitReference x) const
data/linbox-1.6.3/linbox/field/gmp-rational.h:600:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is) { return is; }
data/linbox-1.6.3/linbox/field/gmp-rational.h:645:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is, Element &x) const
data/linbox-1.6.3/linbox/field/gmp-rational.h:843:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		field.read (is, elt);
data/linbox-1.6.3/linbox/field/multimod-field.h:200:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is) {
data/linbox-1.6.3/linbox/field/multimod-field.h:220:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is, Element &x) const
data/linbox-1.6.3/linbox/field/param-fuzzy.h:398:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is) { return is >> _fuzz; }
data/linbox-1.6.3/linbox/field/param-fuzzy.h:417:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is, Element &x) const
data/linbox-1.6.3/linbox/matrix/archetype.h:124:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &file, const Field &F);
data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:559:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &file);
data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:975:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream &file); // autodetect ?
data/linbox-1.6.3/linbox/matrix/grid.h:117:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			read(F, in, mR, mC);
data/linbox-1.6.3/linbox/matrix/grid.h:127:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		void read(Field F, std::istream& in, std::vector<int>& mR, std::vector<int>& mC)
data/linbox-1.6.3/linbox/matrix/grid.h:163:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					F.read(in, x);
data/linbox-1.6.3/linbox/matrix/matrixdomain/blas-matrix-domain.h:932:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		inline std::istream &read (std::istream &is, Matrix &A) const
data/linbox-1.6.3/linbox/matrix/matrixdomain/blas-matrix-domain.h:934:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return A.read (is, field());
data/linbox-1.6.3/linbox/matrix/matrixdomain/matrix-domain.h:144:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		inline std::istream &read (std::istream &is, Matrix_ &A) const
data/linbox-1.6.3/linbox/matrix/matrixdomain/matrix-domain.h:146:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return A.read (is, _field);
data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain-factory.h:290:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t kernelLength = strlen(kernel);
data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain.h:972:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		inline std::istream &read(std::istream &is, Matrix &A) const{
data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain.h:973:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return A.read (is, _F);
data/linbox-1.6.3/linbox/matrix/matrixdomain/plain-domain.h:91:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	using Father_t::read;
data/linbox-1.6.3/linbox/matrix/matrixdomain/plain-domain.h:222:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::istream& read(std::istream& in, Submatrix& A) const
data/linbox-1.6.3/linbox/matrix/matrixdomain/plain-domain.h:230:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				read(in, a);
data/linbox-1.6.3/linbox/matrix/plain-matrix.h:126:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream &is) // The matrix read must have the same shape.
data/linbox-1.6.3/linbox/matrix/plain-matrix.h:187:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream &is) // Will be reshaped to match the matrix read.
data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:368:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream &file, const Field& field);
data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:424:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::istream& DenseMat<_Element>::read (std::istream &file, const Field& field)
data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:431:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			field.read (file, *p);
data/linbox-1.6.3/linbox/matrix/sliced3/dense-sliced.h:606:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		is.read((char *)&(*_rep), bytes);
data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h:79:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	using Field::read;
data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h:151:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::istream& read(std::istream& is, Matrix& A) const { 
data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h:158:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				read(is, x);
data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/SlicedPolynomialMatrix.h:189:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &file);
data/linbox-1.6.3/linbox/matrix/sparse-matrix.h:59:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return A.read (is);
data/linbox-1.6.3/linbox/matrix/sparsematrix/read-write-sparse.h:136:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		static std::istream &read (Matrix &A
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-associative-vector.h:187:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-associative-vector.h:190:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return SparseMatrixReadHelper<Self_t>::read (*this, is
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h:501:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream &file,
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h:751:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					field().read(is,z)  ;
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h:784:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					field().read(is,z)  ;
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h:845:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					field().read(is,z)  ;
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h:872:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					field().read(is,z)  ;
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-matrix.h:667:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream &is
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-matrix.h:670:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return SparseMatrixReadHelper<Self_t>::read(*this,is,format);
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-csr-matrix.h:760:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream &is
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-csr-matrix.h:763:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return SparseMatrixReadHelper<Self_t>::read(*this,is,format);
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ell-matrix.h:706:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream &is
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ell-matrix.h:709:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return SparseMatrixReadHelper<Self_t>::read(*this,is,format);
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ellr-matrix.h:720:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream &is
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ellr-matrix.h:723:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return SparseMatrixReadHelper<Self_t>::read(*this,is,format);
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-generic.h:270:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is,   Tag::FileFormat format = Tag::FileFormat::Detect );
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-generic.h:489:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return A.read (is);
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-hyb-matrix.h:601:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream &file,
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-hyb-matrix.h:606:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return reader().read(file,fmt);
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-map-map-matrix.h:137:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::istream& read(std::istream& in);
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-parallel-vector.h:217:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-parallel-vector.h:220:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return SparseMatrixReadHelper<Self_t>::read (*this, is , format);
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-sequence-vector.h:185:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &is
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-sequence-vector.h:188:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return SparseMatrixReadHelper<Self_t>::read (*this, is
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-tpl-matrix-omp.h:256:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::istream& read(std::istream& in);
data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-tpl-matrix.h:77:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::istream& read(std::istream& in);
data/linbox-1.6.3/linbox/ring/envelope.h:280:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream& is) { return FieldEnvelope<Ring>::read (is); }
data/linbox-1.6.3/linbox/ring/envelope.h:280:71:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream& is) { return FieldEnvelope<Ring>::read (is); }
data/linbox-1.6.3/linbox/ring/envelope.h:285:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream& is, ElementAbstract& x) const
data/linbox-1.6.3/linbox/ring/envelope.h:286:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			{ return FieldEnvelope<Ring>::read (is, x); }
data/linbox-1.6.3/linbox/ring/local-pir-modular.h:133:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	using Parent_t:: read ;
data/linbox-1.6.3/linbox/ring/local-pir-modular.h:136:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        std::istream& read (std::istream& is)
data/linbox-1.6.3/linbox/ring/local-pir-modular.h:137:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	{ std::string s; return Parent_t::read(is >> s)>> s >> _irred >> s >> _exponent; }
data/linbox-1.6.3/linbox/ring/ntl/ntl-gf2e.h:183:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read(std::istream& is, Element& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h:360:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read(std::istream& is, Element& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h:536:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read(std::istream& i, Element& p) const {
data/linbox-1.6.3/linbox/ring/ntl/ntl-zz.h:95:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream& in) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-zz.h:426:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read(std::istream& in, Element& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:211:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::istream& read(std::istream& is, Element& x) const
data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:337:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::istream &read(std::istream &is, Element &e) const
data/linbox-1.6.3/linbox/ring/pir-ntl-zz_p.h:123:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream& read (std::istream& in)  {
data/linbox-1.6.3/linbox/ring/pir-ntl-zz_p.h:406:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		using Father_t::read;
data/linbox-1.6.3/linbox/util/error.h:48:18:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            std::strncpy(strg, msg, max_error_string);
data/linbox-1.6.3/linbox/util/formats/generic-dense.h:87:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			this->ms->getField().read(*(this->sin),v);
data/linbox-1.6.3/linbox/util/formats/maple.h:74:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strlen(cand) < 6 ||
data/linbox-1.6.3/linbox/util/formats/maple.h:190:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				this->ms->getField().read(*stin,ele);
data/linbox-1.6.3/linbox/util/formats/maple.h:199:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				this->ms->getField().read(*(this->sin),ele);
data/linbox-1.6.3/linbox/util/formats/matrix-market.h:154:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				this->ms->getField().read(*(this->sin),v);
data/linbox-1.6.3/linbox/util/formats/sms.h:109:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			this->ms->getField().read(*(this->sin),v);
data/linbox-1.6.3/linbox/util/formats/sparse-row.h:108:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			this->ms->getField().read(*(this->sin),v);
data/linbox-1.6.3/linbox/vector/slicedpolynomialvector/SlicedPolynomialVector.h:165:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::istream &read (std::istream &file);
data/linbox-1.6.3/linbox/vector/vector-domain-gf2.h:125:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		inline std::istream &read (std::istream &is, Vector &x) const
data/linbox-1.6.3/linbox/vector/vector-domain.h:271:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		inline std::istream &read (std::istream &is, Vector &x) const
data/linbox-1.6.3/tests/test-blackbox.h:269:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		B.read(in);
data/linbox-1.6.3/tests/test-cradomain.C:174:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	bool locpass = std::equal( Res.begin(), Res.end(), iteration.getVector().begin() );
data/linbox-1.6.3/tests/test-cradomain.C:199:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	bool locpass = std::equal( Res.begin(), Res.end(), iteration.getVector().begin() );
data/linbox-1.6.3/tests/test-cradomain.C:221:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	bool locpass = std::equal( iteration.getVector().begin(), iteration.getVector().end(), Res.getWritePointer() );
data/linbox-1.6.3/tests/test-frobenius-large.C:45:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	M.read(iF);
data/linbox-1.6.3/tests/test-frobenius-small.C:44:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	M.read(iF);
data/linbox-1.6.3/tests/test-invariant-factors.C:57:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	M.read(iF);
data/linbox-1.6.3/tests/test-smith-form-iliopoulos.C:62:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	A.read(data);
data/linbox-1.6.3/tests/test-tutorial.C:61:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	A.read(smsin);
data/linbox-1.6.3/tests/test-zero-one.C:81:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	   testMatrix.read(mat_in);

ANALYSIS SUMMARY:

Hits = 856
Lines analyzed = 189176 in approximately 4.82 seconds (39213 lines/second)
Physical Source Lines of Code (SLOC) = 109820
Hits@level = [0]  31 [1] 211 [2] 100 [3] 515 [4]  30 [5]   0
Hits@level+ = [0+] 887 [1+] 856 [2+] 645 [3+] 545 [4+]  30 [5+]   0
Hits/KSLOC@level+ = [0+] 8.07685 [1+] 7.79457 [2+] 5.87325 [3+] 4.96267 [4+] 0.273174 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.