Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/shim-15+1533136590.3beb971/Cryptlib/Base.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Cipher/CryptAesNull.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Cipher/CryptArc4Null.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Cipher/CryptTdesNull.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Hash/CryptMd4Null.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Hash/CryptMd5.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Hash/CryptSha1.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Hash/CryptSha256.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Hash/CryptSha512.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Hmac/CryptHmacMd5Null.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Hmac/CryptHmacSha1Null.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Hmac/CryptHmacSha256Null.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/Protocol/RuntimeCrypt.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/arpa/inet.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/assert.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/ctype.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/dirent.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/errno.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/bio.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/comp.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/conf.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/constant_time_locl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dane.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dso.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dso_conf.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/err.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/numbers.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/o_dir.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/o_str.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/thread_once.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/limits.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/malloc.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/math.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/memory.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/netdb.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/netinet/in.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/aes.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/asn1.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/asn1_mac.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/asn1t.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/async.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/bio.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/blowfish.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/bn.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/buffer.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/camellia.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/cast.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/cmac.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/cms.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/comp.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/conf.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/conf_api.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/crypto.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ct.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/des.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/dh.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/dsa.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/dtls1.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/e_os2.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ebcdic.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ec.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ecdh.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ecdsa.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/engine.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/err.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/evp.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/hmac.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/idea.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/kdf.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/lhash.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/md2.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/md4.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/md5.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/mdc2.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/obj_mac.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/objects.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ocsp.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/opensslconf.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/opensslv.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ossl_typ.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/pem.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/pem2.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/pkcs12.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/pkcs7.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/rand.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/rc2.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/rc4.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/rc5.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ripemd.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/rsa.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/safestack.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/sha.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/srp.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/srtp.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ssl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ssl2.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ssl3.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/stack.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/symhacks.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/tls1.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ts.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/txt_db.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ui.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/whrlpool.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/x509.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/x509_vfy.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/x509v3.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/sgtty.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/signal.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/stdarg.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/stddef.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/stdio.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/stdlib.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/string.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/strings.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/sys/ioctl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/sys/param.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/sys/socket.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/sys/stat.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/sys/time.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/sys/times.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/sys/types.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/sys/un.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/syslog.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/time.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Include/unistd.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/InternalCryptLib.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Library/BaseCryptLib.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Library/BaseLib.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Library/BaseMemoryLib.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Library/DebugLib.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Library/MemoryAllocationLib.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/buildinf.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/LPdir_nyi.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_cbc.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_cfb.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_core.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ecb.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_locl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_misc.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ofb.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_wrap.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_bitstr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_d2i_fp.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_digest.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_dup.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_gentm.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_i2d_fp.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_int.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_mbstr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_object.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_octet.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_print.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_sign.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_strex.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_strnid.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_time.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_type.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_utctm.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_utf8.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_verify.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/ameth_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_gen.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_locl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_par.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_mime.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_moid.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_mstbl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_pack.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/bio_asn1.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/bio_ndef.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/charmap.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/d2i_pr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/d2i_pu.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/evp_asn1.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/f_int.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/f_string.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/i2d_pr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/i2d_pu.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/n_pkey.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/nsseq.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/p5_pbe.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/p5_pbev2.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/p5_scrypt.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/p8_pkey.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/t_bitst.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/t_pkey.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/t_spki.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_dec.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_enc.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_fre.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_new.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_prn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_scn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_typ.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_utl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/x_algor.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/x_bignum.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/x_info.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/x_long.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/x_pkey.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/x_sig.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/x_spki.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/x_val.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/async/arch/async_null.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/async/arch/async_null.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/async/arch/async_posix.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/async/arch/async_posix.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/async/arch/async_win.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/async/arch/async_win.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/async/async.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/async/async_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/async/async_locl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/async/async_wait.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_addr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_dump.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_print.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_sock.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_sock2.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_buff.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_lbuf.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_nbio.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_null.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bio_cb.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bio_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bio_lcl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bio_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bio_meth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_acpt.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_bio.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_conn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_fd.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_file.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_log.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_mem.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_null.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_sock.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_add.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_asm.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_blind.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_const.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_ctx.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_depr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_dh.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_div.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_exp.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_exp2.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_gcd.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_gf2m.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_intern.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_kron.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_lcl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_mod.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_mont.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_mpi.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_mul.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_nist.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_prime.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_prime.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_print.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_rand.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_recp.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_shift.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_sqr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_sqrt.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_srp.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_word.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_x931p.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/rsaz_exp.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/rsaz_exp.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/buffer/buf_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/buffer/buffer.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cm_ameth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cm_pmeth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/comp/c_zlib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/comp/comp_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/comp/comp_lcl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/comp/comp_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_api.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_def.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_def.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_mall.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_mod.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_sap.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cpt_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cryptlib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cversion.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_ameth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_asn1.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_check.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_depr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_gen.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_kdf.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_key.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_locl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_meth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_pmeth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_prn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_rfc5114.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_locl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_openssl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ebcdic.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err_all.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err_prn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_b64.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_enc.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_md.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_ok.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/c_allc.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/c_alld.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/cmeth_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/digest.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_bf.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_camellia.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_cast.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_idea.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_null.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_old.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc2.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc4.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc4_hmac_md5.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc5.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_seed.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_xcbc_d.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/encode.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_cnf.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_enc.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_key.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_locl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_pbe.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_pkey.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_md2.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_md4.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_md5.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_md5_sha1.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_mdc2.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_null.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_ripemd.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_sha1.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_sigver.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_wp.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/names.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt2.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p_dec.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p_enc.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p_open.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p_seal.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p_sign.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p_verify.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/pmeth_fn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/pmeth_gn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/pmeth_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/scrypt.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ex_data.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hm_ameth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hm_pmeth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hmac.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hmac_lcl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/asn1_int.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/async.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/bn_dh.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/bn_int.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/bn_srp.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/chacha.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/cryptlib.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/cryptlib_int.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/engine.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/err_int.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/evp_int.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/md32_common.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/objects.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/poly1305.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/rand.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/x509_int.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/init.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/hkdf.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/kdf_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/tls1_prf.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/lhash/lh_stats.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/lhash/lhash.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/lhash/lhash_lcl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/md5/md5_dgst.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/md5/md5_locl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/md5/md5_one.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_clr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_dbg.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_sec.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cbc128.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ccm128.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ctr128.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/gcm128.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/modes_lcl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ofb128.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/xts128.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_dir.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fips.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_init.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_str.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_time.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/o_names.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_dat.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_lcl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_xref.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_xref.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_dat.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_asn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_cl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_ext.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_ht.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_lcl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_prn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_srv.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_vfy.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/v3_ocsp.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_all.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_info.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_oth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_pk8.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_pkey.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_sign.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_x509.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_xaux.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pvkfmt.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_add.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_asn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_attr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_crpt.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_crt.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_decr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_init.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_key.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_kiss.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_lcl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_mutl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_npas.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_p8d.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_p8e.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_sbag.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_utl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/pk12err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/bio_pk7.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_asn1.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_attr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_dgst.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_doit.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_enc.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_mime.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_smime.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pkcs7err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/md_rand.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_egd.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_lcl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_unix.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_vms.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_win.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rc4/rc4_enc.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rc4/rc4_locl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rc4/rc4_skey.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_ameth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_asn1.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_chk.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_crpt.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_depr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_gen.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_locl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_meth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_none.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_null.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_oaep.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_ossl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pk1.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pmeth.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_prn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pss.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_saos.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_sign.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_ssl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_x931.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_x931g.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha1_one.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha1dgst.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha256.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha512.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha_locl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/stack/stack.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/threads_none.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/threads_pthread.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/threads_win.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/txt_db/txt_db.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/uid.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/by_dir.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/by_file.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/t_crl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/t_req.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/t_x509.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_att.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_cmp.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_d2.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_def.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_ext.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_lcl.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_lu.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_obj.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_r2x.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_req.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_set.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_trs.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_txt.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_v3.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_vfy.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_vpm.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509cset.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509name.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509rset.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509spki.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509type.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_all.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_attrib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_crl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_exten.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_name.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_pubkey.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_req.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_x509.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_x509a.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/ext_dat.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/pcy_cache.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/pcy_data.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/pcy_int.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/pcy_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/pcy_map.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/pcy_node.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/pcy_tree.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_akey.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_akeya.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_alt.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_asid.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_bcons.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_bitst.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_conf.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_cpols.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_crld.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_enum.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_extku.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_genn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_ia5.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_info.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_int.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_lib.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_ncons.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pci.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pcia.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pcons.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pku.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pmaps.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_prn.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_purp.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_skey.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_sxnet.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_tlsf.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3err.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/e_os.h
Examining data/shim-15+1533136590.3beb971/Cryptlib/Pem/CryptPemNull.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Pk/CryptAuthenticode.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Pk/CryptDhNull.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Pk/CryptPkcs7SignNull.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Pk/CryptPkcs7Verify.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Pk/CryptRsaBasic.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Pk/CryptRsaExtNull.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Pk/CryptTs.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Pk/CryptX509.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/Rand/CryptRand.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/SysCall/BaseMemAllocation.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/SysCall/BaseStrings.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/SysCall/CrtWrapper.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/SysCall/TimerWrapper.c
Examining data/shim-15+1533136590.3beb971/Cryptlib/SysCall/memset.c
Examining data/shim-15+1533136590.3beb971/PasswordCrypt.c
Examining data/shim-15+1533136590.3beb971/buildid.c
Examining data/shim-15+1533136590.3beb971/crypt_blowfish.c
Examining data/shim-15+1533136590.3beb971/fallback.c
Examining data/shim-15+1533136590.3beb971/httpboot.c
Examining data/shim-15+1533136590.3beb971/include/Http.h
Examining data/shim-15+1533136590.3beb971/include/Ip4Config2.h
Examining data/shim-15+1533136590.3beb971/include/Ip6Config.h
Examining data/shim-15+1533136590.3beb971/include/PasswordCrypt.h
Examining data/shim-15+1533136590.3beb971/include/PeImage.h
Examining data/shim-15+1533136590.3beb971/include/configtable.h
Examining data/shim-15+1533136590.3beb971/include/console.h
Examining data/shim-15+1533136590.3beb971/include/crypt_blowfish.h
Examining data/shim-15+1533136590.3beb971/include/efiauthenticated.h
Examining data/shim-15+1533136590.3beb971/include/errors.h
Examining data/shim-15+1533136590.3beb971/include/execute.h
Examining data/shim-15+1533136590.3beb971/include/guid.h
Examining data/shim-15+1533136590.3beb971/include/hexdump.h
Examining data/shim-15+1533136590.3beb971/include/httpboot.h
Examining data/shim-15+1533136590.3beb971/include/netboot.h
Examining data/shim-15+1533136590.3beb971/include/replacements.h
Examining data/shim-15+1533136590.3beb971/include/security_policy.h
Examining data/shim-15+1533136590.3beb971/include/shell.h
Examining data/shim-15+1533136590.3beb971/include/simple_file.h
Examining data/shim-15+1533136590.3beb971/include/str.h
Examining data/shim-15+1533136590.3beb971/include/tpm.h
Examining data/shim-15+1533136590.3beb971/include/ucs2.h
Examining data/shim-15+1533136590.3beb971/include/variables.h
Examining data/shim-15+1533136590.3beb971/include/wincert.h
Examining data/shim-15+1533136590.3beb971/lib/configtable.c
Examining data/shim-15+1533136590.3beb971/lib/console.c
Examining data/shim-15+1533136590.3beb971/lib/execute.c
Examining data/shim-15+1533136590.3beb971/lib/guid.c
Examining data/shim-15+1533136590.3beb971/lib/security_policy.c
Examining data/shim-15+1533136590.3beb971/lib/shell.c
Examining data/shim-15+1533136590.3beb971/lib/simple_file.c
Examining data/shim-15+1533136590.3beb971/lib/variables.c
Examining data/shim-15+1533136590.3beb971/model.c
Examining data/shim-15+1533136590.3beb971/mok.c
Examining data/shim-15+1533136590.3beb971/netboot.c
Examining data/shim-15+1533136590.3beb971/replacements.c
Examining data/shim-15+1533136590.3beb971/shim.c
Examining data/shim-15+1533136590.3beb971/shim.h
Examining data/shim-15+1533136590.3beb971/tpm.c
Examining data/shim-15+1533136590.3beb971/version.h
Examining data/shim-15+1533136590.3beb971/errlog.c
Examining data/shim-15+1533136590.3beb971/MokManager.c

FINAL RESULTS:

data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:316:16:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int            chmod       (const char *, mode_t);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/bio.h:747:29:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
                      int (*gets) (BIO *, char *, int));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c:57:10:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
# define chmod   _chmod
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c:258:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    chmod(file, 0600);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:301:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char           *strcpy     (char *, const char *);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:304:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
char           *strcat     (char *, const char *);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:313:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int            printf      (const char *, ...);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:314:16:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int            sscanf      (const char *, const char *, ...);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:327:16:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int            fprintf     (FILE *, const char *, ...);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:328:16:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int            vfprintf    (FILE *, const char *, VA_LIST);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:336:16:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void           syslog      (int, const char *, ...);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:373:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define strcpy(strDest,strSource)         AsciiStrCpy(strDest,strSource)
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:375:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define strcat(strDest,strSource)         AsciiStrCat(strDest,strSource)
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/evp.h:676:19:  [4] (crypto) EVP_des_ecb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_ecb(void);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/evp.h:682:11:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
#  define EVP_des_cfb EVP_des_cfb64
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/evp.h:691:19:  [4] (crypto) EVP_des_ofb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_ofb(void);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/evp.h:694:19:  [4] (crypto) EVP_des_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_cbc(void);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/evp.h:697:19:  [4] (crypto) EVP_desx_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_desx_cbc(void);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/evp.h:707:19:  [4] (crypto) EVP_rc4_40:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc4_40(void);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/evp.h:722:19:  [4] (crypto) EVP_rc2_40_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_40_cbc(void);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/evp.h:723:19:  [4] (crypto) EVP_rc2_64_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_64_cbc(void);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_sock.c:276:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(*ip_port, host);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_sock.c:278:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(*ip_port, port);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bio_lcl.h:158:26:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define UP_fprintf      fprintf
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cryptlib.c:92:12:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#   define _vsntprintf _vsnwprintf
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cryptlib.c:94:12:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#   define _vsntprintf _vsnprintf
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cryptlib.c:243:5:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _vsntprintf(buf, OSSL_NELEM(buf) - 1, fmt, ap);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cryptlib.c:281:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, fmta, ap);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:197:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(merged, filespec2);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:199:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(&merged[spec2len + 1], filespec1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:232:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(translated, "lib%s%s", filename, DSO_EXTENSION);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:234:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(translated, "%s%s", filename, DSO_EXTENSION);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:236:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(translated, "%s", filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c:236:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(merged, filespec2);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c:238:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(&merged[spec2len + 1], filespec1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c:264:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(translated, "lib%s" DSO_EXTENSION, filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c:266:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(translated, "%s" DSO_EXTENSION, filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c:268:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(translated, "%s", filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:188:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(p->imagename, ext);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:192:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(p->imagename, sp2);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:298:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(symname_32p, symname);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:402:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(filespec1_32p, filespec1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:403:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(filespec2_32p, filespec2);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:464:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(not_translated, filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:411:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(merged, filespec1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:418:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(merged, filespec2);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:479:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(translated, "%s.dll", filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:481:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(translated, "%s", filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/c_allc.c:21:20:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
    EVP_add_cipher(EVP_des_cfb());
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/c_allc.c:29:20:  [4] (crypto) EVP_des_ofb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
    EVP_add_cipher(EVP_des_ofb());
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/c_allc.c:33:20:  [4] (crypto) EVP_desx_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
    EVP_add_cipher(EVP_desx_cbc());
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/c_allc.c:37:20:  [4] (crypto) EVP_des_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
    EVP_add_cipher(EVP_des_cbc());
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/c_allc.c:45:20:  [4] (crypto) EVP_des_ecb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
    EVP_add_cipher(EVP_des_ecb());
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/c_allc.c:58:20:  [4] (crypto) EVP_rc4_40:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
    EVP_add_cipher(EVP_rc4_40());
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/c_allc.c:87:20:  [4] (crypto) EVP_rc2_40_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
    EVP_add_cipher(EVP_rc2_40_cbc());
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/c_allc.c:88:20:  [4] (crypto) EVP_rc2_64_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
    EVP_add_cipher(EVP_rc2_64_cbc());
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_old.c:34:10:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
#  undef EVP_des_cfb
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_old.c:35:19:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_cfb(void);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_old.c:36:19:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_cfb(void)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc2.c:73:19:  [4] (crypto) EVP_rc2_64_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_64_cbc(void)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc2.c:78:19:  [4] (crypto) EVP_rc2_40_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_40_cbc(void)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc4.c:64:19:  [4] (crypto) EVP_rc4_40:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc4_40(void)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_xcbc_d.c:47:19:  [4] (crypto) EVP_desx_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_desx_cbc(void)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_alt.c:111:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(oline, htmp);
data/shim-15+1533136590.3beb971/Cryptlib/SysCall/CrtWrapper.c:164:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int sscanf (const char *buffer, const char *format, ...)
data/shim-15+1533136590.3beb971/Cryptlib/SysCall/CrtWrapper.c:444:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int printf (char const *fmt, ...)
data/shim-15+1533136590.3beb971/MokManager.c:278:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(name, part);
data/shim-15+1533136590.3beb971/fallback.c:195:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(fullpath, L"\\EFI\\");
data/shim-15+1533136590.3beb971/fallback.c:196:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(fullpath, dirname);
data/shim-15+1533136590.3beb971/fallback.c:197:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(fullpath, L"\\");
data/shim-15+1533136590.3beb971/fallback.c:198:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(fullpath, filename);
data/shim-15+1533136590.3beb971/fallback.c:239:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy((CHAR16 *)cursor, label);
data/shim-15+1533136590.3beb971/fallback.c:243:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy((CHAR16 *)cursor, arguments);
data/shim-15+1533136590.3beb971/fallback.c:413:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy((CHAR16 *)cursor, label);
data/shim-15+1533136590.3beb971/fallback.c:417:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy((CHAR16 *)cursor, arguments);
data/shim-15+1533136590.3beb971/lib/execute.c:81:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(*PathName, devpathstr);
data/shim-15+1533136590.3beb971/lib/execute.c:84:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(*PathName, L"\\");
data/shim-15+1533136590.3beb971/lib/execute.c:85:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(*PathName, name);
data/shim-15+1533136590.3beb971/lib/simple_file.c:226:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(entries[i], name);
data/shim-15+1533136590.3beb971/lib/simple_file.c:235:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(*selected , entries[val]);
data/shim-15+1533136590.3beb971/lib/simple_file.c:268:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(newfilter, filter);
data/shim-15+1533136590.3beb971/lib/simple_file.c:419:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(newname, name);
data/shim-15+1533136590.3beb971/lib/simple_file.c:469:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(newname, name);
data/shim-15+1533136590.3beb971/lib/simple_file.c:472:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(newname, L"\\");
data/shim-15+1533136590.3beb971/lib/simple_file.c:473:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(newname, selected);
data/shim-15+1533136590.3beb971/lib/simple_file.c:488:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(*result, name);
data/shim-15+1533136590.3beb971/lib/simple_file.c:490:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(*result, L"\\");
data/shim-15+1533136590.3beb971/lib/simple_file.c:491:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(*result, selected);
data/shim-15+1533136590.3beb971/shim.c:1656:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(*PathName, bootpath);
data/shim-15+1533136590.3beb971/shim.c:1657:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(*PathName, ImagePath);
data/shim-15+1533136590.3beb971/tpm.c:320:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(measureddata[measuredcount].VariableName, VarName);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:346:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char           *getenv     (const char *);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_api.c:85:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                p = getenv(name);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_api.c:98:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        return (getenv(name));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_mod.c:481:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    file = getenv("OPENSSL_CONF");
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cryptlib.c:40:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((env = getenv("OPENSSL_ia32cap"))) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:523:11:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    dll = LoadLibrary(TEXT(DLLNAME));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_mutl.c:114:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        && !getenv("LEGACY_GOST_PKCS12")) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_unix.c:100:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            ts.tv_nsec = random();
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_vms.c:106:13:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            srand(sys_time[0] * data_buffer[0] * data_buffer[1] + i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c:322:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        s = getenv("RANDFILE");
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c:325:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            s = getenv("HOME");
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/threads_win.c:35:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(lock);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/threads_win.c:41:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(lock);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/by_dir.c:83:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            dir = (char *)getenv(X509_get_default_cert_dir_env());
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/by_file.c:50:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            file = (char *)getenv(X509_get_default_cert_file_env());
data/shim-15+1533136590.3beb971/Cryptlib/SysCall/CrtWrapper.c:355:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv (const char *varname)
data/shim-15+1533136590.3beb971/buildid.c:177:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((i = getopt_long(argc, argv, "h", options, &longindex)) != -1) {
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         sa_data[14];  /* actually longer; address value */
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    d_name[255 + 1];  /* name must be no longer than this */
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:286:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void           *memcpy     (void *, const void *, size_t);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:315:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int            open        (const char *, int, ...);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:322:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE           *fopen      (const char *, const char *);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:367:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define memcpy(dest,source,count)         ( {CopyMem(dest,source,(UINTN)(count)); dest; })
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:380:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
#define atoi(nptr)                        AsciiStrDecimalToUintn(nptr)
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/camellia.h:72:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Camellia_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/camellia.h:72:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Camellia_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/camellia.h:74:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[CAMELLIA_BLOCK_SIZE],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/camellia.h:75:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ecount_buf[CAMELLIA_BLOCK_SIZE],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/des.h:28:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char DES_cblock[8];
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/des.h:29:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef /* const */ unsigned char const_DES_cblock[8];
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ebcdic.h:25:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char os_toascii[256];
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/ebcdic.h:26:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char os_toebcdic[256];
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/err.h:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *err_data[ERR_NUM_ERRORS];
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/err.h:47:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *err_file[ERR_NUM_ERRORS];
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/evp.h:370:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/md2.h:28:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MD2_BLOCK];
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/mdc2.h:27:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MDC2_BLOCK];
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:15:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*block128_f) (const unsigned char in[16],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:16:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            unsigned char out[16], const void *key);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:18:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*cbc128_f) (const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:18:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*cbc128_f) (const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:20:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char ivec[16], int enc);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:22:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ctr128_f) (const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:22:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ctr128_f) (const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:24:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const unsigned char ivec[16]);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:26:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ccm128_f) (const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:26:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ccm128_f) (const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:28:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:29:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char cmac[16]);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:31:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:31:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:33:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], block128_f block);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:34:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:34:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:36:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], block128_f block);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:38:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:38:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:40:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:41:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ecount_buf[16], unsigned int *num,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:44:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:44:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:46:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:47:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ecount_buf[16],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:50:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:50:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:52:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], int *num,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:55:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:55:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:57:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], int *num,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:59:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:59:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:61:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], int *num,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:63:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:63:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:65:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], int *num,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:68:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt_block(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:69:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   unsigned char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:70:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   const void *key, unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:72:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:72:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:74:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], cbc128_f cbc);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:75:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt_block(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:76:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   unsigned char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:77:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   const void *key, unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:79:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:79:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:81:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], cbc128_f cbc);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:83:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt_block(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:84:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:86:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:88:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:88:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:90:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16], cbc128_f cbc);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:91:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt_block(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:92:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:94:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:96:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:96:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:98:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16], cbc128_f cbc);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:149:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const unsigned char iv[16],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:172:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ocb128_f) (const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:172:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ocb128_f) (const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:175:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char offset_i[16],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/modes.h:177:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char checksum[16]);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:70:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_set_key(const unsigned char rawkey[SEED_KEY_LENGTH],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:73:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_encrypt(const unsigned char s[SEED_BLOCK_SIZE],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:74:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  unsigned char d[SEED_BLOCK_SIZE],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:76:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_decrypt(const unsigned char s[SEED_BLOCK_SIZE],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:77:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  unsigned char d[SEED_BLOCK_SIZE],
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:82:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cbc_encrypt(const unsigned char *in, unsigned char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:82:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cbc_encrypt(const unsigned char *in, unsigned char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:84:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                      unsigned char ivec[SEED_BLOCK_SIZE], int enc);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:85:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:85:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:87:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char ivec[SEED_BLOCK_SIZE], int *num,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:89:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:89:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/seed.h:91:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char ivec[SEED_BLOCK_SIZE], int *num);
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/sha.h:100:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char p[SHA512_CBLOCK];
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/whrlpool.h:28:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[WHIRLPOOL_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/whrlpool.h:32:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[WHIRLPOOL_BBLOCK / 8];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:31:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define load_block(d, s)        memcpy((d).data, (s), AES_BLOCK_SIZE)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:32:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define store_block(d, s)       memcpy((d), (s).data, AES_BLOCK_SIZE)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:74:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec, ivp->data, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:75:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec + AES_BLOCK_SIZE, iv2p->data, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:99:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec, iv.data, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:100:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec + AES_BLOCK_SIZE, iv2.data, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:127:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec, ivp->data, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:128:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec + AES_BLOCK_SIZE, iv2p->data, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:153:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec, iv.data, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:154:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec + AES_BLOCK_SIZE, iv2.data, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:173:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[AES_BLOCK_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:174:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp2[AES_BLOCK_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:175:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp3[AES_BLOCK_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:176:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char prev[AES_BLOCK_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:200:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(prev, in, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:216:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp, out, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:235:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(prev, tmp, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:248:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp, in, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:249:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp2, in, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:255:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp3, tmp2, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:266:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp, out, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:267:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp2, out, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/aes/aes_ige.c:273:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp3, tmp2, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_bitstr.c:70:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, d, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_bitstr.c:116:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s, p, (int)len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_gentm.c:218:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *_asn1_mon[12] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_int.c:115:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, b, blen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_int.c:180:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(b, p + pad, plen - pad);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_int.c:358:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tbuf[sizeof(r)];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_int.c:393:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tbuf[sizeof(r)];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_int.c:452:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s, p, (int)len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_mbstr.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strbuf[32];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_object.c:34:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, a->data, a->length);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_object.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftmp[24], *tmp = ftmp;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_object.c:175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80], *p = buf;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_object.c:302:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, p, length);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_print.c:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_strex.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmphex[HEX_SIZE(long) + 3];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_strex.c:183:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char utfbuf[6];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_strex.c:219:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hextmp[2];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_strex.c:399:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char objtmp[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_gen.c:225:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, cpy_start, cpy_len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_gen.c:350:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char erch[2];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_lib.c:286:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(str->data, data, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_locl.h:46:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char *_asn1_mon[12];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_par.c:28:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[128];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_mime.c:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bound[33], c;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_mime.c:482:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char linebuf[MAX_SMLEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_mime.c:526:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char iobuf[4096];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_mime.c:562:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char linebuf[MAX_SMLEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_mime.c:627:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char linebuf[MAX_SMLEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_moid.c:98:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(lntmp, ln, p - ln);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/evp_asn1.c:45:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, p, num);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/evp_asn1.c:108:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data, ASN1_STRING_get0_data(atmp->oct), n);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/f_int.c:20:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/f_string.c:20:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/p5_pbe.c:54:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sstr, salt, saltlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/p5_pbev2.c:47:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/p5_pbev2.c:69:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/p5_pbev2.c:172:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(osalt->data, salt, saltlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/p5_scrypt.c:57:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/p5_scrypt.c:93:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/p5_scrypt.c:225:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *salt, key[EVP_MAX_KEY_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_dec.c:1032:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf->data + len, *p, plen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_enc.c:415:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, tder->data, tder->length);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_enc.c:603:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cout, cont, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_prn.c:407:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char objbuf[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_utl.c:138:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(enc->enc, in, inlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/tasn_utl.c:153:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*out, enc->enc, enc->len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/x_long.c:69:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ltmp, cp, sizeof(long));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/x_long.c:138:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cp, &ltmp, sizeof(long));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/async/async.c:234:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ctx->currjob->funcargs, args, size);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_addr.c:181:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, addrptr, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_addr.c:222:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char host[NI_MAXHOST] = "", serv[NI_MAXSERV] = "";
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_addr.c:265:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char serv[6];        /* port is 16 bits => max 5 decimal digits */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_dump.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[288 + 1], tmp[20], str[128 + 1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_print.c:450:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char convert[DECIMAL_SIZE(value) + 3];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_print.c:579:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char iconvert[20];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_print.c:580:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fconvert[20];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_print.c:581:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char econvert[20];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_print.c:853:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(*buffer, *sbuffer, *currlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_print.c:894:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hugebuf[1024 * 2];     /* Was previously 10k, which is unreasonable
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_buff.c:105:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, &(ctx->ibuf[ctx->ibuf_off]), i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_buff.c:172:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ctx->obuf[ctx->obuf_off + ctx->obuf_len]), in, inl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_buff.c:180:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(ctx->obuf[ctx->obuf_off + ctx->obuf_len]), in, i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_buff.c:291:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->ibuf, ptr, (int)num);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_lbuf.c:138:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(&(ctx->obuf[ctx->obuf_len]), in, p - in);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_lbuf.c:144:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(&(ctx->obuf[ctx->obuf_len]), in, i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_lbuf.c:191:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ctx->obuf[ctx->obuf_len]), in, inl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_lbuf.c:239:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p, ctx->obuf, ctx->obuf_len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bio_cb.c:21:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bio_lcl.h:166:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
# define UP_fopen        fopen
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bio_lcl.h:180:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define UP_open         open
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_bio.c:167:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, peer_b->buf + peer_b->offset, chunk);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_bio.c:323:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(b->buf + write_offset, buf, chunk);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:232:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&timeleft, &(data->next_timeout), sizeof(struct timeval));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:583:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, &data->peer, (ret = num));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:589:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(data->next_timeout), ptr, sizeof(struct timeval));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1000:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmsgbuf[512];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndinfo)) +
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1286:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(data->saved_message.data, in, inl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1436:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&authkey->sca_key[0], ptr, 64 * sizeof(uint8_t));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1530:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, &(data->sndinfo), num);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1538:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(data->sndinfo), ptr, num);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1545:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, &data->rcvinfo, num);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1554:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(data->rcvinfo), ptr, num);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1561:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, &(data->prinfo), num);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1569:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(data->prinfo), ptr, num);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_file.c:188:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char p[4];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_log.c:129:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char str[10];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_log.c:249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pidbuf[DECIMAL_SIZE(DWORD) + 4];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_log.c:278:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(pidbuf, "[%lu] ", GetCurrentProcessId());
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_log.c:322:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[10240];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_log.c:365:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(opcdef_p->opc$z_ms_target_classes, &VMS_OPC_target, 3);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_log.c:367:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&opcdef_p->opc$l_ms_text, buf, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_mem.c:189:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, bm->data, ret);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_mem.c:219:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(bbm->buf->data + blen, in, inl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_ctx.c:262:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(newitems, st->indexes, sizeof(*newitems) * st->depth);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_intern.c:171:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, in->d, sizeof(*out) * in->top);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_intern.c:196:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(a->d, words, sizeof(BN_ULONG) * num_words);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_lib.c:91:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char bits[256] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_lib.c:309:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(A, b->d, sizeof(b->d[0]) * b->top);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_lib.c:400:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(a->d, b->d, sizeof(b->d[0]) * b->top);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_mont.c:156:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(rp, ap, nl * sizeof(BN_ULONG));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_print.c:332:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char data[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_rand.c:204:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char random_bytes[64];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_rand.c:205:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[SHA512_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_rand.c:209:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char private_bytes[96];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_rand.c:228:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(private_bytes, priv->d, todo);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/bn_rand.c:244:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(k_bytes + done, digest, todo);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/rsaz_exp.c:99:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char storage[320 * 3 + 32 * 9 * 16 + 64]; /* 5.5KB */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bn/rsaz_exp.c:299:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char storage[16 * 8 * 8 + 64 * 2 + 64]; /* 1.2KB */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/buffer/buffer.c:66:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ret, str->data, str->length);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c:20:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char k1[EVP_MAX_BLOCK_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c:21:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char k2[EVP_MAX_BLOCK_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c:23:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tbl[EVP_MAX_BLOCK_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char last_block[EVP_MAX_BLOCK_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c:92:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out->k1, in->k1, bl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c:93:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out->k2, in->k2, bl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c:94:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out->tbl, in->tbl, bl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c:95:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out->last_block, in->last_block, bl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c:103:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char zero_iv[EVP_MAX_BLOCK_LENGTH] = { 0 };
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c:158:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->last_block + ctx->nlast_block, data, nleft);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cmac/cmac.c:177:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->last_block, data, dlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_api.c:202:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v->section, section, i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_def.c:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char btmp[DECIMAL_SIZE(eline) + 1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_mod.c:172:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char rcode[DECIMAL_SIZE(ret) + 1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cryptlib.c:168:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR buf[256];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cryptlib.c:200:18:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            if (!MultiByteToWideChar(CP_ACP, 0, fmta, len_0, fmtw, len_0))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_kdf.c:57:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char ctr[4] = { 0xF3, 0x17, 0x22, 0x53 };
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_kdf.c:119:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char mtmp[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_kdf.c:139:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(out, mtmp, outlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_meth.c:45:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, dhm, sizeof(*dhm));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_pmeth.c:212:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        len = atoi(value);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_pmeth.c:218:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        len = atoi(value);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_pmeth.c:226:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        len = atoi(value);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_pmeth.c:231:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        len = atoi(value);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dh/dh_pmeth.c:236:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        typ = atoi(value);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:71:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errbuf[160];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:137:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errbuf[160];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:263:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(path, inf.filename, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c:333:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(path, dli.dli_fname, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[NAMX_MAXRSS + 1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:76:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char imagename[NAMX_MAXRSS + 1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:284:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char symname_32[NAMX_MAXRSS + 1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:324:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errstring[257];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:372:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char esa[NAMX_MAXRSS + 1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:384:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filespec1_32[NAMX_MAXRSS + 1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:385:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filespec2_32[NAMX_MAXRSS + 1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:426:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errstring[257];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:48:10:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    if (!MultiByteToWideChar(CP_ACP, 0, lpLibFileName, len_0, fnamw, len_0))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:347:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(&result[offset], "\\\\");
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ebcdic.c:29:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toascii[256] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ebcdic.c:65:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toebcdic[256] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ebcdic.c:116:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toascii[256] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ebcdic.c:184:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toebcdic[256] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ebcdic.c:260:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toascii[256] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ebcdic.c:299:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toebcdic[256] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err.c:187:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char strerror_tab[NUM_SYS_STR_REASONS][LEN_SYS_STR_REASON];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err.c:202:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char (*dest)[LEN_SYS_STR_REASON] = &(strerror_tab[i - 1]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err.c:500:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lsbuf[64], fsbuf[64], rsbuf[64];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err.c:556:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[256];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err_prn.c:21:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err_prn.c:22:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[4096];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_b64.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[EVP_ENCODE_LENGTH(B64_BLOCK_SIZE) + 10];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_b64.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[B64_BLOCK_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_b64.c:139:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, &(ctx->buf[ctx->buf_off]), i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_b64.c:302:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, ctx->buf, i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_b64.c:375:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(ctx->tmp[ctx->tmp_len]), in, n);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_b64.c:392:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(ctx->tmp, in, n);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_enc.c:45:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[BUF_OFFSET + ENC_BLOCK_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_enc.c:125:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, &(ctx->buf[ctx->buf_off]), i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_enc.c:222:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, ctx->buf, i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_ok.c:107:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[IOBS];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_ok.c:187:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(out, &(ctx->buf[ctx->buf_off]), i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_ok.c:298:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ctx->buf[ctx->buf_len], in, n);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_ok.c:465:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(ctx->buf[ctx->buf_len]), md_data, md_size);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_ok.c:486:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_ok.c:503:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(md_data, &(ctx->buf[ctx->buf_off]), md_size);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_ok.c:566:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/cmeth_lib.c:34:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(to, cipher, sizeof(*to));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/digest.c:204:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, in, sizeof(*out));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/digest.c:223:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out->md_data, in->md_data, out->digest->ctx_size);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:56:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    void (*stream) (const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:57:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    unsigned char *out, size_t length,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:59:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    const unsigned char iv[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:91:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tag[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:92:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data_buf[16]; /* Store partial data blocks */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:93:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char aad_buf[16];  /* Store partial AAD blocks */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:120:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:120:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:122:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char ivec[16], int enc);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:123:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:123:67:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:125:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                const unsigned char ivec[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:126:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_xts_encrypt(const unsigned char *inp, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:126:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_xts_encrypt(const unsigned char *inp, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:128:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const AES_KEY *key2, const unsigned char iv[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:129:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_xts_decrypt(const unsigned char *inp, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:129:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_xts_decrypt(const unsigned char *inp, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:131:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const AES_KEY *key2, const unsigned char iv[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:134:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_ctr32_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:134:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_ctr32_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:136:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const unsigned char ivec[AES_BLOCK_SIZE]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:139:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_xts_encrypt(const char *inp, char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:139:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_xts_encrypt(const char *inp, char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:141:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     const unsigned char iv[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:142:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_xts_decrypt(const char *inp, char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:142:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_xts_decrypt(const char *inp, char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:144:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     const unsigned char iv[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:205:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_xts_encrypt(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:206:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:209:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const unsigned char iv[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:211:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_xts_decrypt(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:212:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:215:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const unsigned char iv[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:217:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ccm64_encrypt_blocks(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:218:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:221:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                const unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:222:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                unsigned char cmac[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:224:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ccm64_decrypt_blocks(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:225:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:228:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                const unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:229:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                unsigned char cmac[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:232:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t aesni_gcm_encrypt(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:233:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:235:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         const void *key, unsigned char ivec[16], u64 *Xi);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:237:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t aesni_gcm_decrypt(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:238:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:240:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         const void *key, unsigned char ivec[16], u64 *Xi);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:355:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, iv, gctx->ivlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:397:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:423:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 15 - cctx->L);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:434:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ocb_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:434:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ocb_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:437:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char offset_i[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:439:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char checksum[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:440:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ocb_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:440:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ocb_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:443:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char offset_i[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:445:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char checksum[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:491:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(octx->iv, iv, octx->ivlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:759:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, iv, gctx->ivlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:820:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:845:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 15 - cctx->L);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:899:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(octx->iv, iv, octx->ivlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1013:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1013:67:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1015:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                const unsigned char ivec[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1016:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_xts_encrypt(const unsigned char *inp, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1016:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_xts_encrypt(const unsigned char *inp, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1018:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const AES_KEY *key2, const unsigned char iv[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1019:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_xts_decrypt(const unsigned char *inp, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1019:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_xts_decrypt(const unsigned char *inp, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1021:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const AES_KEY *key2, const unsigned char iv[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1326:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_buf_noconst(c), ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1334:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, EVP_CIPHER_CTX_buf_noconst(c), arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1340:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, ptr, gctx->ivlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1351:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1364:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, gctx->iv + gctx->ivlen - arg, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1377:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(gctx->iv + gctx->ivlen - arg, ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1386:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_buf_noconst(c), ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1423:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(gctx_out->iv, gctx->iv, gctx->ivlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1504:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, iv, gctx->ivlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1897:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1949:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_buf_noconst(c), ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1976:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(c), ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:1994:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(EVP_CIPHER_CTX_buf_noconst(c), ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2066:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 15 - cctx->L);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2082:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, EVP_CIPHER_CTX_buf_noconst(ctx),
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2085:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(EVP_CIPHER_CTX_iv_noconst(ctx) + EVP_CCM_TLS_FIXED_IV_LEN, in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2109:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char tag[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2173:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char tag[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2224:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, EVP_CIPHER_CTX_iv_length(ctx));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2414:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(octx->tag, ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2421:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, octx->tag, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2439:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ocb_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2439:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ocb_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2442:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char offset_i[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2444:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char checksum[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2449:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ocb_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2449:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ocb_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2452:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char offset_i[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2454:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char checksum[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2534:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(octx->iv, iv, octx->ivlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2587:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(buf + (*buf_len), in, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2591:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf + (*buf_len), in, remaining);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes.c:2641:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, in, trailing_len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:30:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char tls_aad[16]; /* 13 used */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:54:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        const AES_KEY *key, unsigned char iv[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:58:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           const AES_KEY *key, unsigned char iv[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:161:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char storage[sizeof(SHA1_MB_CTX) + 32];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:196:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ciph_d[0].out - 16, IVs, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:197:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ciph_d[0].iv, IVs, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:203:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].out - 16, IVs, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:204:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].iv, IVs, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:209:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(blocks[0].c, key->md.data, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:240:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(blocks[i].c + 13, hash_d[i].ptr, 64 - 13);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:277:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ciph_d[i].iv, ciph_d[i].out - 16, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:294:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(blocks[i].c, ptr, off);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:359:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].out, ciph_d[i].inp, len - processed);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:455:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(out + aes_off, in + aes_off, plen - aes_off);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:477:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char c[32 + SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:489:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char c[SHA_CBLOCK];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:492:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char tail_iv[AES_BLOCK_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:502:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), in, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:513:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(tail_iv, in + len - 2 * AES_BLOCK_SIZE,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:564:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ctx->iv, tail_iv, AES_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:772:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char hmac_key[64];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:781:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(hmac_key, ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha1.c:823:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(key->aux.tls_aad, ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:31:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char tls_aad[16]; /* 13 used */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:55:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         const AES_KEY *key, unsigned char iv[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:157:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char storage[sizeof(SHA256_MB_CTX) + 32];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:193:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ciph_d[0].out - 16, IVs, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:194:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ciph_d[0].iv, IVs, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:200:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].out - 16, IVs, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:201:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].iv, IVs, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:206:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(blocks[0].c, key->md.data, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:240:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(blocks[i].c + 13, hash_d[i].ptr, 64 - 13);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:277:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ciph_d[i].iv, ciph_d[i].out - 16, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:294:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(blocks[i].c, ptr, off);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:371:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].out, ciph_d[i].inp, len - processed);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:483:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(out + aes_off, in + aes_off, plen - aes_off);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:505:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char c[64 + SHA256_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:521:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char c[SHA256_CBLOCK];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:748:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char hmac_key[64];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:760:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(hmac_key, ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_aes_cbc_hmac_sha256.c:800:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(key->aux.tls_aad, ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:27:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[CHACHA_BLK_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:34:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           const unsigned char user_key[CHACHA_KEY_SIZE],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:35:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           const unsigned char iv[CHACHA_CTR_SIZE], int enc)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:152:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tag[POLY1305_BLOCK_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:178:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char temp[CHACHA_CTR_SIZE] = { 0 };
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:182:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(temp + CHACHA_CTR_SIZE - actx->nonce_len, iv, actx->nonce_len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:201:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char zero[POLY1305_BLOCK_SIZE] = { 0 };
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:256:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char temp[POLY1305_BLOCK_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:299:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(out, actx->tag, POLY1305_BLOCK_SIZE);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:380:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(actx->tag, ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:388:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, actx->tag, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_chacha20_poly1305.c:404:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(temp, aad, EVP_AEAD_TLS1_AAD_LEN - 2);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des.c:41:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        const DES_key_schedule *ks, unsigned char iv[8]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des.c:43:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        const DES_key_schedule *ks, unsigned char iv[8]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des.c:148:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[1], d[1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:45:69:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             const DES_key_schedule ks[3], unsigned char iv[8]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:47:69:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             const DES_key_schedule ks[3], unsigned char iv[8]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:166:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[1], d[1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:239:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&dat->ks3, &dat->ks1, sizeof(dat->ks1));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:248:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&dat->ks3, &dat->ks1, sizeof(dat->ks1));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:313:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char wrap_iv[8] =
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:319:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char icv[8], iv[8], sha1tmp[SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:325:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), wrap_iv, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:365:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha1tmp[SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:372:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out + inl + 8, sha1tmp, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:377:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, EVP_CIPHER_CTX_iv_noconst(ctx), 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_des3.c:381:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), wrap_iv, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_null.c:48:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, in, inl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc2.c:126:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc4_hmac_md5.c:112:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(out + rc4_off, in + rc4_off, plen - rc4_off);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc4_hmac_md5.c:125:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char mac[MD5_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc4_hmac_md5.c:185:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char hmac_key[64];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_rc4_hmac_md5.c:194:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(hmac_key, ptr, arg);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_xcbc_d.c:58:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data(ctx)->inw[0], &key[8], 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/e_xcbc_d.c:59:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data(ctx)->outw[0], &key[16], 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/encode.c:41:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char data_bin2ascii[65] = "ABCDEFGHIJKLMNOPQRSTUVWXYZ\
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/encode.c:60:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char data_ascii2bin[128] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/encode.c:108:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dctx, sctx, sizeof(EVP_ENCODE_CTX));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/encode.c:136:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ctx->enc_data[ctx->num]), in, inl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/encode.c:142:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ctx->enc_data[ctx->num]), in, i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/encode.c:167:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ctx->enc_data[0]), in, inl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_enc.c:181:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ctx->oiv, iv, EVP_CIPHER_CTX_iv_length(ctx));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_enc.c:182:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_enc.c:189:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ctx->iv, iv, EVP_CIPHER_CTX_iv_length(ctx));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_enc.c:342:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(ctx->buf[i]), in, inl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_enc.c:348:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(ctx->buf[i]), in, j);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_enc.c:367:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->buf, &(in[inl]), i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_enc.c:464:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, ctx->final, b);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_enc.c:480:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->final, &out[*outl], b);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_enc.c:622:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, in, sizeof(*out));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_enc.c:631:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out->cipher_data, in->cipher_data, in->cipher->ctx_size);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_key.c:19:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char prompt_string[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_key.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[BUFSIZ];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_key.c:80:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md_buf[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_lib.c:87:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(c->iv, c->oiv, l);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_lib.c:330:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(to, md, sizeof(*to));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_locl.h:30:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_locl.h:31:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_locl.h:32:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[EVP_MAX_BLOCK_LENGTH]; /* saved partial block */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_locl.h:41:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char final[EVP_MAX_BLOCK_LENGTH]; /* possible final block */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_locl.h:59:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char enc_data[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_pbe.c:90:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char obj_tmp[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_pkey.c:25:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obj_tmp[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_md5_sha1.c:52:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char padtmp[48];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_md5_sha1.c:53:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md5tmp[MD5_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_md5_sha1.c:54:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha1tmp[SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_sha1.c:36:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char padtmp[40];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_sha1.c:37:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha1tmp[SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_sigver.c:103:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/m_sigver.c:141:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt.c:29:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md_tmp[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt.c:30:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt.c:90:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt.c:92:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)),
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt2.c:36:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digtmp[EVP_MAX_MD_SIZE], *p, itmp[4];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt2.c:89:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, digtmp, cplen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt2.c:135:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char out[4];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt2.c:202:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *salt, key[EVP_MAX_KEY_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p_seal.c:22:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p_sign.c:20:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char m[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p_verify.c:20:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char m[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/scrypt.c:75:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(B_ + (i / 2 + (i & 1) * r) * 16, X, sizeof(X));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hm_ameth.c:90:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*pder, os->data, os->length);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hmac.c:22:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pad[HMAC_MAX_MD_CBLOCK];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hmac.c:52:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ctx->key, key, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hmac.c:101:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hmac.c:190:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dctx->key, sctx->key, HMAC_MAX_MD_CBLOCK);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hmac.c:204:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hmac.c:205:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char dummy_key[1] = {'\0'};
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/hmac/hmac_lcl.h:26:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[HMAC_MAX_MD_CBLOCK];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/chacha.h:30:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32(unsigned char *out, const unsigned char *inp,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/chacha.h:30:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32(unsigned char *out, const unsigned char *inp,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/md32_common.h:275:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p + n, data, HASH_CBLOCK - n);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/md32_common.h:289:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p + n, data, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/md32_common.h:306:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, data, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/poly1305.h:17:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Poly1305_Init(POLY1305 *ctx, const unsigned char key[32]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/poly1305.h:19:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Poly1305_Final(POLY1305 *ctx, unsigned char mac[16]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/x509_int.h:92:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha1_hash[SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/include/internal/x509_int.h:166:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha1_hash[SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/hkdf.c:42:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char info[HKDF_MAXBUF];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/hkdf.c:118:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(kctx->info + kctx->info_len, p2, p1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/hkdf.c:208:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char prk[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/hkdf.c:240:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char prev[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/hkdf.c:282:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(okm + done_len, prev, copy_len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/tls1_prf.c:32:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char seed[TLS1_PRF_MAXBUF];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/tls1_prf.c:82:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(kctx->seed + kctx->seedlen, p2, p1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/tls1_prf.c:172:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char A1[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/kdf/tls1_prf.c:221:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(out, A1, olen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/md5/md5_one.c:22:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[MD5_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/md5/md5_one.c:32:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char temp[1024];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem.c:157:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, str, old_len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_dbg.c:453:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_dbg.c:515:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(buf + buf_len, amip->info, 128 - buf_len - 3);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_sec.c:408:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fd = open("/dev/zero", O_RDWR)) >= 0) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cbc128.c:18:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cbc128.c:18:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cbc128.c:20:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], block128_f block)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cbc128.c:63:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ivec, iv, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cbc128.c:66:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cbc128.c:66:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cbc128.c:68:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], block128_f block)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cbc128.c:73:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cbc128.c:104:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ivec, iv, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ccm128.c:54:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ctx->nonce.c[1], nonce, 14 - L);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ccm128.c:169:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(temp.c, inp, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ccm128.c:182:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, temp.c, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ccm128.c:252:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(temp.c, inp, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ccm128.c:255:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, scratch.c, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ccm128.c:430:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tag, ctx->cmac.c, M);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:19:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:19:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:21:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], int *num,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:137:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void cfbr_encrypt_block(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:137:66:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void cfbr_encrypt_block(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:139:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                               unsigned char ivec[16], int enc,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:143:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ovec[16 * 2 + 1]; /* +1 because we dereference (but don't
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:150:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ovec, ivec, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:164:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ivec, ovec + num, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:173:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:173:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:175:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], int *num,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:179:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[1], d[1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:189:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:189:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cfb128.c:191:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], int *num,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ctr128.c:71:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ctr128.c:71:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ctr128.c:73:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ctr128.c:74:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ecount_buf[16], unsigned int *num,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ctr128.c:147:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ctr128.c:147:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ctr128.c:149:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ctr128.c:150:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ecount_buf[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:27:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt_block(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:28:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   unsigned char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:29:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   const void *key, unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:50:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, out - 16, residue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:51:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out - 16, ivec, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:56:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt_block(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:57:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:59:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:82:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out - 16 + residue, ivec, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:87:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:87:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:89:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], cbc128_f cbc)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:94:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:111:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, out - 16, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:113:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, tmp.c, residue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:116:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in, residue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:117:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, out - 16, residue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:123:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:123:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:125:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16], cbc128_f cbc)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:130:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:152:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in, residue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:158:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt_block(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:159:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   unsigned char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:160:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   const void *key, unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:166:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[32];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:185:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, tmp.c + 16, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:186:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in + 16, residue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:200:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt_block(const unsigned char *in,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:201:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char *out, size_t len,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:203:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char ivec[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:209:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[32];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:232:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, tmp.c + 16, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:233:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in, residue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:248:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:248:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:250:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], cbc128_f cbc)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:255:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[32];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:278:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in + 16, residue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:283:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, tmp.c, 16 + residue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:288:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:288:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:290:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16], cbc128_f cbc)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:295:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[32];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:322:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in, residue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:327:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, tmp.c, 16 + residue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:337:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char test_key[16] = "chicken teriyaki";
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:338:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char test_input[64] =
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:341:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char test_iv[16] =
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:344:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char vector_17[17] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:350:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char vector_31[31] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:357:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char vector_32[32] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:364:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char vector_47[47] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:373:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char vector_48[48] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:382:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char vector_64[64] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:397:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[sizeof(test_iv)];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:398:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cleartext[64], ciphertext[64];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:409:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, test_iv, sizeof(test_iv));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:418:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, test_iv, sizeof(test_iv));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:427:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, test_iv, sizeof(test_iv));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:436:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, test_iv, sizeof(test_iv));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:447:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[sizeof(test_iv)];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:448:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cleartext[64], ciphertext[64], nistvector[64];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:458:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nistvector, vector, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:460:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nistvector + len, vector + len + 16, tail);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:461:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nistvector + len + tail, vector + len, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:466:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, test_iv, sizeof(test_iv));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:475:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, test_iv, sizeof(test_iv));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:484:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, test_iv, sizeof(test_iv));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/cts128.c:493:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, test_iv, sizeof(test_iv));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/gcm128.c:850:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->Yi.c, iv, 12);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/gcm128.c:1649:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tag, ctx->Xi.c,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/modes_lcl.h:151:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:46:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mask[15];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:207:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, sizeof(OCB128_CONTEXT));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:216:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest->l, src->l, (src->l_index + 1) * 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:227:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ktop[16], tmp[16], mask;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:228:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char stretch[24], nonce[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:242:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nonce + 16 - len, iv, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:246:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, nonce, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:251:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(stretch, ktop, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:314:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&tmp1, aad + (num_blocks * 16), last_len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:364:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    (const unsigned char (*)[16])ctx->l, ctx->checksum.c);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:410:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&tmp1, in + (len / 16) * 16, last_len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:456:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    (const unsigned char (*)[16])ctx->l, ctx->checksum.c);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:502:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&tmp1, out + (len / 16) * 16, last_len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ocb128.c:552:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tag, &ctx->tag, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ofb128.c:19:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ofb128.c:19:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/ofb128.c:21:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], int *num, block128_f block)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:53:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *A, B[16], *R;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:63:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(A, iv, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:68:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(B + 8, R, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:76:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(R, B + 8, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:79:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, A, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:104:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *A, B[16], *R;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:111:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(A, in, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:122:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(B + 8, R, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:124:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(R, B + 8, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:127:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, A, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:155:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char got_iv[8];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:198:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char aiv[8];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:207:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aiv, default_aiv, 4);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:209:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aiv, icv, 4);    /* Standard doesn't mention this. */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:223:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, aiv, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:262:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char aiv[8];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:263:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char zeros[8] = { 0x0 };
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/wrap128.c:279:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aiv, out, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/xts128.c:15:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const unsigned char iv[16],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/xts128.c:35:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tweak.c, iv, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/xts128.c:44:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(scratch.c, inp, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/xts128.c:55:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, scratch.c, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/xts128.c:99:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out - 16, scratch.c, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/xts128.c:127:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(scratch.c, inp, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/modes/xts128.c:149:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, scratch.c, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c:35:15:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    if ((sz = MultiByteToWideChar(CP_UTF8, (flags = MB_ERR_INVALID_CHARS),
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c:38:16:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
         (sz = MultiByteToWideChar(CP_UTF8, (flags = 0),
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c:44:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        if (MultiByteToWideChar(CP_UTF8, flags,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c:46:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            MultiByteToWideChar(CP_UTF8, 0, mode, strlen(mode) + 1,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c:55:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            file = fopen(filename, mode);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c:58:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file = fopen(filename, mode);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c:86:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file = fopen(filename, mode);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c:91:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(filename, mode);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_str.c:38:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, str, size);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_str.c:54:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, str, maxlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_str.c:72:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    return memcpy(ret, data, siz);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_time.c:63:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result, ts, sizeof(struct tm));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_time.c:70:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char logvalue[256];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_time.c:129:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        status = atoi(logvalue);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_dat.c:400:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tbuf[DECIMAL_SIZE(i) + DECIMAL_SIZE(l) + 2];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_dat.c:637:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[512];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_dat.h:13:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char so[6765] = {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_ext.c:268:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmpval, val, len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_lib.c:50:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_srv.c:232:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_srv.c:256:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md[SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_vfy.c:162:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmphash[SHA_DIGEST_LENGTH], *keyhash;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_vfy.c:273:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/v3_ocsp.c:177:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*pp, os->data, os->length);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_info.c:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PEM_BUFSIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:43:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, key, i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:100:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char map[17] = "0123456789ABCDEF";
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PEM_BUFSIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:303:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:304:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:400:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:401:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PEM_BUFSIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:669:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:709:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(nameB->data, &(buf[11]), i - 6);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:740:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(headerB->data[hl]), buf, i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:772:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(dataB->data[bl]), buf, i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_pk8.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PEM_BUFSIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_pk8.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char psbuf[PEM_BUFSIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_pkey.c:54:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char psbuf[PEM_BUFSIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_pkey.c:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pem_str[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_pkey.c:154:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pem_str[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pvkfmt.c:204:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hdr_buf[16], *buf = NULL;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pvkfmt.c:669:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char psbuf[PEM_BUFSIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pvkfmt.c:670:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char keybuf[20];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pvkfmt.c:690:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(enctmp, p, 8);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pvkfmt.c:734:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pvk_hdr[24], *buf = NULL;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pvkfmt.c:810:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char psbuf[PEM_BUFSIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pvkfmt.c:811:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char keybuf[20];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_crpt.c:27:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_crt.c:40:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char keyid[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_decr.c:102:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fname[30];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_decr.c:104:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(fname, "DER%d", fnm++);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_decr.c:105:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        op = fopen(fname, "wb");
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_key.c:141:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, Ai, min(n, u));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_key.c:171:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(I + j, B + 1, v);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_mutl.c:54:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char out[96];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_mutl.c:64:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(key, out + sizeof(out) - TK26_MAC_KEY_LEN, TK26_MAC_KEY_LEN);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_mutl.c:80:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_MD_SIZE], *salt;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_mutl.c:148:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mac[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_mutl.c:175:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mac[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_mutl.c:230:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p12->mac->salt->data, salt, saltlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_npas.c:66:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mac[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_doit.c:270:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char key[EVP_MAX_KEY_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_doit.c:271:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char iv[EVP_MAX_IV_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_doit.c:611:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md_data[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_doit.c:771:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md_data[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs7/pk7_doit.c:990:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md_dat[EVP_MAX_MD_SIZE], *abuf = NULL;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/md_rand.c:44:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char state[STATE_SIZE + MD_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/md_rand.c:45:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char md[MD_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/md_rand.c:121:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char local_md[MD_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/md_rand.c:172:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(local_md, md, sizeof md);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/md_rand.c:280:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char local_md[MD_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/md_rand.c:419:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(local_md, md, sizeof md);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_egd.c:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sun_path[108];         /* path name (gag) */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_egd.c:99:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char egdbuf[2], tempbuf[255], *retrievebuf;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_unix.c:128:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[ENTROPY_NEEDED];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_unix.c:147:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmpbuf[ENTROPY_NEEDED];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_unix.c:170:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fd = open(randomfiles[i], O_RDONLY
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c:58:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
# define open    _open
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c:99:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      (__FILE_ptr32 (*)(const char *, const char *, ...))fopen;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c:119:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[BUFSIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c:186:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[BUFSIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c:225:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int fd = open(file, O_WRONLY | O_CREAT | O_BINARY, 0600);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_meth.c:45:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, meth, sizeof(*meth));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_none.c:27:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, from, (unsigned int)flen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_none.c:41:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to + tlen - flen, from, flen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_oaep.c:48:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *dbmask, seedmask[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_oaep.c:78:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(db + emlen - flen - mdlen, from, (unsigned int)flen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_oaep.c:82:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(seed,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_oaep.c:173:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(em + num - flen, from, flen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_oaep.c:230:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(to, db + msg_index, mlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_oaep.c:251:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cnt[4];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_oaep.c:253:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_oaep.c:278:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(mask + outlen, md, len - outlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pk1.c:40:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, from, (unsigned int)flen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pk1.c:112:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, p, (unsigned int)j);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pk1.c:150:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, from, (unsigned int)flen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pk1.c:191:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(em + num - flen, from, flen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pk1.c:237:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, em + msg_index, mlen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pmeth.c:141:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rctx->tbuf, tbs, tbslen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pmeth.c:201:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(rout, rctx->tbuf, ret);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pmeth.c:554:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        saltlen = atoi(value);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pmeth.c:560:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nbits = atoi(value);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_pss.c:42:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char H_[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_sign.c:160:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rm, decrypt_buf, SSL_SIG_LENGTH);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_sign.c:180:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rm, decrypt_buf + 2, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_sign.c:226:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rm, m, m_len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_ssl.c:51:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, from, (unsigned int)flen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_ssl.c:97:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, p, (unsigned int)j);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_x931.c:47:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, from, (unsigned int)flen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rsa/rsa_x931.c:92:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, p, (unsigned int)j);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha1_one.c:18:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha256.c:52:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[SHA224_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha256.c:66:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[SHA256_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha512.c:208:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p + c->num, data, len), c->num += (unsigned int)len;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha512.c:211:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p + c->num, data, n), c->num = 0;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha512.c:221:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(p, data, sizeof(c->u)),
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha512.c:231:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, data, len), c->num = (int)len;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha512.c:253:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[SHA384_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/sha/sha512.c:267:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[SHA512_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/stack/stack.c:55:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ret->data, sk->data, sizeof(char *) * sk->num);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/t_x509.c:224:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char SHA1md[SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/t_x509.c:326:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char oidstr[80], first;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_cmp.c:37:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_cmp.c:187:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[SHA_DIGEST_LENGTH];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_cmp.c:211:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_obj.c:34:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char hex[17] = "0123456789ABCDEF";
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_obj.c:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_buf[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_obj.c:38:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ebcdic_buf[1024];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_obj.c:136:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, s, (unsigned int)l1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_vfy.c:1760:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff1[24], buff2[24], *p;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_vfy.c:1778:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, str, 10);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_vfy.c:1788:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, str, 12);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_vfy.c:2588:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mdbuf[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_vpm.c:456:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ipout[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509name.c:42:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, data->data, i);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_all.c:370:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(md, data->sha1_hash, sizeof(data->sha1_hash));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_all.c:384:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(md, data->sha1_hash, sizeof(data->sha1_hash));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_name.c:178:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nm.x->bytes->data, q, p - q);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x_name.c:225:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*out, a->bytes->data, ret);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:104:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(addr, bs->data, bs->length);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:129:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char addr[ADDR_RAW_BUF_LEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:277:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char addr_a[ADDR_RAW_BUF_LEN], addr_b[ADDR_RAW_BUF_LEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:484:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[3];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:683:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char a_min[ADDR_RAW_BUF_LEN], a_max[ADDR_RAW_BUF_LEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:684:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char b_min[ADDR_RAW_BUF_LEN], b_max[ADDR_RAW_BUF_LEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:806:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char a_min[ADDR_RAW_BUF_LEN], a_max[ADDR_RAW_BUF_LEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:807:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char b_min[ADDR_RAW_BUF_LEN], b_max[ADDR_RAW_BUF_LEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:851:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char a_min[ADDR_RAW_BUF_LEN], a_max[ADDR_RAW_BUF_LEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:902:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char min[ADDR_RAW_BUF_LEN], max[ADDR_RAW_BUF_LEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:1093:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char p_min[ADDR_RAW_BUF_LEN], p_max[ADDR_RAW_BUF_LEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_addr.c:1094:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c_min[ADDR_RAW_BUF_LEN], c_max[ADDR_RAW_BUF_LEN];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_alt.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char oline[256], htmp[5];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_extku.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obj_tmp[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_ia5.c:38:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, ia5->data, ia5->length);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_info.c:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char objtmp[80], *ntmp;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pci.c:138:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(*policy)->data[(*policy)->length],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pci.c:157:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[2048];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pci.c:185:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(*policy)->data[(*policy)->length], buf, n);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pci.c:202:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(*policy)->data[(*policy)->length],
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pmaps.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obj_tmp1[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pmaps.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obj_tmp2[80];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_skey.c:62:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pkey_dig[EVP_MAX_MD_SIZE];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:903:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ipout[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:921:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ipout[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:945:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ipout[32];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:1016:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[16];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:1075:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v6, v6stat.tmp, v6stat.zero_pos);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:1080:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(v6 + v6stat.zero_pos + 16 - v6stat.total,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:1084:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v6, v6stat.tmp, 16);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/e_os.h:475:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#   define open _open
data/shim-15+1533136590.3beb971/Cryptlib/SysCall/CrtWrapper.c:414:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE *fopen (const char *c, const char *m)
data/shim-15+1533136590.3beb971/MokManager.c:250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[NAME_LINE_MAX];
data/shim-15+1533136590.3beb971/MokManager.c:292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[30];
data/shim-15+1533136590.3beb971/MokManager.c:309:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hexbuf[30];
data/shim-15+1533136590.3beb971/MokManager.c:398:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[buflen];
data/shim-15+1533136590.3beb971/MokManager.c:837:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char pw_ascii[PASSWORD_MAX + 1];
data/shim-15+1533136590.3beb971/MokManager.c:1830:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mokbuffer + sizeof(EFI_SIGNATURE_LIST) + 16, data,
data/shim-15+1533136590.3beb971/PasswordCrypt.c:275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *retval, result[BF_RESULT_SIZE];
data/shim-15+1533136590.3beb971/buildid.c:124:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fd = open(f, O_RDONLY)) < 0)
data/shim-15+1533136590.3beb971/crypt_blowfish.c:349:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char BF_itoa64[64 + 1] =
data/shim-15+1533136590.3beb971/crypt_blowfish.c:352:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char BF_atoi64[0x60] = {
data/shim-15+1533136590.3beb971/crypt_blowfish.c:605:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const unsigned char flags_by_subtype[26] =
data/shim-15+1533136590.3beb971/crypt_blowfish.c:770:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char * const test_hash[2] =
data/shim-15+1533136590.3beb971/crypt_blowfish.c:777:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[7 + 22 + 1];
data/shim-15+1533136590.3beb971/crypt_blowfish.c:778:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char o[7 + 22 + 31 + 1 + 1 + 1];
data/shim-15+1533136590.3beb971/lib/simple_file.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/shim-15+1533136590.3beb971/lib/simple_file.c:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/shim-15+1533136590.3beb971/lib/simple_file.c:197:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[4096];
data/shim-15+1533136590.3beb971/netboot.c:112:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(url, option->Data, urllen);
data/shim-15+1533136590.3beb971/netboot.c:221:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ip6str, start, end - start);
data/shim-15+1533136590.3beb971/netboot.c:223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tftp_addr.v6, str2ip6(ip6str), 16);
data/shim-15+1533136590.3beb971/netboot.c:229:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(full_path, end, strlen(end));
data/shim-15+1533136590.3beb971/netboot.c:233:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(end, template, strlen(template));
data/shim-15+1533136590.3beb971/netboot.c:293:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tftp_addr.v4, pkt_v4->BootpSiAddr, 4);
data/shim-15+1533136590.3beb971/tpm.c:131:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(capsp, &caps, sizeof(caps));
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:302:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
char           *strncpy    (char *, const char *, size_t);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:303:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t         strlen      (const char *);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:306:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
char           *strncpy    (char *, const char *, size_t);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:319:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ssize_t        read        (int, void *, size_t);
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:372:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define strlen(str)                       (size_t)(AsciiStrLen((CHAR8 *)str))
data/shim-15+1533136590.3beb971/Cryptlib/Include/CrtLibSupport.h:374:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define strncpy(strDest,strSource,count)  AsciiStrnCpy(strDest,strSource,(UINTN)count)
data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dane.h:72:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    uint32_t        umask;      /* Usages present */
data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dane.h:93:52:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_PKIX(dane) ((dane) && ((dane)->umask & DANETLS_PKIX_MASK))
data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dane.h:94:52:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_DANE(dane) ((dane) && ((dane)->umask & DANETLS_DANE_MASK))
data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dane.h:95:52:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_TA(dane)   ((dane) && ((dane)->umask & DANETLS_TA_MASK))
data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dane.h:96:52:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_EE(dane)   ((dane) && ((dane)->umask & DANETLS_EE_MASK))
data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dane.h:98:53:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_PKIX_TA(dane) ((dane)&&((dane)->umask & DANETLS_PKIX_TA_MASK))
data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dane.h:99:53:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_PKIX_EE(dane) ((dane)&&((dane)->umask & DANETLS_PKIX_EE_MASK))
data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dane.h:100:53:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_DANE_TA(dane) ((dane)&&((dane)->umask & DANETLS_DANE_TA_MASK))
data/shim-15+1533136590.3beb971/Cryptlib/Include/internal/dane.h:101:53:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_DANE_EE(dane) ((dane)&&((dane)->umask & DANETLS_DANE_EE_MASK))
data/shim-15+1533136590.3beb971/Cryptlib/Include/openssl/bio.h:741:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      int (*read) (BIO *, char *, int));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_gentm.c:147:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    t.length = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_gentm.c:206:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tmps->length = strlen(p);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_mbstr.c:57:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((const char *)in);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_object.c:53:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        num = strlen(buf);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_strex.c:316:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        outlen += strlen(tagname);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_strex.c:497:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            objlen = strlen(objbuf);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_time.c:108:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    t.length = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_utctm.c:118:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    t.length = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/a_utctm.c:178:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s->length = strlen(p);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/ameth_lib.c:148:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/ameth_lib.c:170:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (((int)strlen(ameth->pem_str) == len)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_gen.c:567:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(tagstr);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn1_lib.c:273:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(data);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_mime.c:569:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    blen = strlen(bound);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_mime.c:774:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (p = name + strlen(name) - 1; p >= name; p--) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_mime.c:946:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        linelen = strlen(line);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/asn_mime.c:948:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        blen = strlen(bound);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/asn1/bio_asn1.c:293:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return asn1_bio_write(b, str, strlen(str));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_addr.c:122:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(ap->s_un.sun_path, where, sizeof(ap->s_un.sun_path) - 1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_addr.c:172:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(ap->s_un.sun_path);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_addr.c:509:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pl = strlen(p);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_addr.c:532:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pl = strlen(p);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_addr.c:535:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            hl = strlen(h);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_addr.c:538:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pl = strlen(p);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_addr.c:679:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (addrinfo_wrap(family, socktype, host, strlen(host), 0, res))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_dump.c:91:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret += cb((void *)buf, strlen(buf), u);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_dump.c:97:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret += cb((void *)buf, strlen(buf), u);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_print.c:487:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        min - OSSL_MAX(max, place) - (signvalue ? 1 : 0) - strlen(prefix);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_sock.c:267:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            *ip_port = OPENSSL_zalloc(strlen(host) + strlen(port) + 2);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_sock.c:267:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            *ip_port = OPENSSL_zalloc(strlen(host) + strlen(port) + 2);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/b_sock.c:277:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(*ip_port, ":");
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_buff.c:454:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (buffer_write(b, str, strlen(str)));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bf_lbuf.c:318:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (linebuffer_write(b, str, strlen(str)));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bio_cb.c:93:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        BIO_write(b, buf, strlen(buf));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bio_lcl.h:181:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define UP_read         read
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_acpt.c:539:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_bio.c:602:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return bio_write(bio, str, strlen(str));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_conn.c:527:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:800:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_dgram.c:1841:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_fd.c:194:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_fd.c:211:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret = strlen(buf);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_file.c:285:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(p, "b");
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_file.c:287:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(p, "t");
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_file.c:349:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret = strlen(buf);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_file.c:358:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_log.c:198:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, in, inl);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_log.c:230:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_mem.c:84:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sz = (len < 0) ? strlen(buf) : (size_t)len;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_mem.c:343:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_null.c:99:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (strlen(str));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/bio/bss_sock.c:162:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_api.c:198:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(section) + 1;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_def.c:205:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ii = i = strlen(p);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_def.c:314:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            v->name = OPENSSL_malloc(strlen(pname) + 1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_def.c:320:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            OPENSSL_strlcpy(v->name, pname, strlen(pname) + 1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_def.c:410:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(from) + 1;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_def.c:515:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        (strlen(p) + buf->length - (e - from)))) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_mod.c:272:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nchar = strlen(name);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_mod.c:485:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(X509_get_default_cert_area());
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_mod.c:489:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len += strlen(OPENSSL_CONF);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/conf/conf_mod.c:536:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                tmpend = lstart + strlen(lstart) - 1;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/cryptlib.c:192:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t len_0 = strlen(fmta) + 1, i;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:185:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        spec2len = (filespec2 ? strlen(filespec2) : 0);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:186:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = spec2len + (filespec1 ? strlen(filespec1) : 0);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:216:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:221:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        rsize += strlen(DSO_EXTENSION); /* The length of ".s?" */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dl.c:258:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = (int)strlen(inf.filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c:224:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        spec2len = strlen(filespec2);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c:225:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = spec2len + strlen(filespec1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c:248:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c:253:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        rsize += strlen(DSO_EXTENSION);    /* The length of ".so" */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_dlfcn.c:328:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (int)strlen(dli.dli_fname);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:167:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sp2 = sp1 + strlen(sp1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:171:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        || (sp1 - filename) + strlen(sp2) > FILENAME_MAX) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:182:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(p->filename, sp1, sp2 - sp1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:185:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(p->imagename, filename, sp1 - filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:194:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p->filename_dsc.dsc$w_length = strlen(p->filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:198:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p->imagename_dsc.dsc$w_length = strlen(p->imagename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:301:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    symname_dsc.dsc$w_length = strlen(SYMNAME);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:395:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    filespec1len = strlen(filespec1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:396:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    filespec2len = strlen(filespec2);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:452:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(merged, nam.NAMX_ESA, nam.NAMX_ESL);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_vms.c:461:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:36:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len_0 = strlen(lpLibFileName) + 1, i;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:349:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&result[offset], file_split->node, file_split->nodelen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:356:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&result[offset], file_split->device, file_split->devicelen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:369:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&result[offset], start, end - start);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:382:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&result[offset], start, end - start);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:388:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(&result[offset], file_split->file, file_split->filelen);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:406:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        merged = OPENSSL_malloc(strlen(filespec1) + 1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:413:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        merged = OPENSSL_malloc(strlen(filespec2) + 1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/dso/dso_win32.c:464:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(filename);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err.c:351:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        end = &file[strlen(file) - 1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err.c:524:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(buf) == len - 1) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err.c:724:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            n += strlen(a);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/err/err_prn.c:41:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (cb(buf2, strlen(buf2), u) <= 0)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_b64.c:541:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b64_write(b, str, strlen(str));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_ok.c:469:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!EVP_DigestUpdate(md, WELLKNOWN, strlen(WELLKNOWN)))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/bio_ok.c:507:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!EVP_DigestUpdate(md, WELLKNOWN, strlen(WELLKNOWN)))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_key.c:26:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(prompt_string, prompt, 79);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/evp_pbe.c:103:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        passlen = strlen(pass);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt.c:61:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        passlen = strlen(pass);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/p5_crpt2.c:53:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        passlen = strlen(pass);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/evp/pmeth_lib.c:349:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_dbg.c:474:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bufp += strlen(bufp);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_dbg.c:478:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bufp += strlen(bufp);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_dbg.c:483:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bufp += strlen(bufp);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_dbg.c:487:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bufp += strlen(bufp);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_dbg.c:512:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            buf_len = strlen(buf);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_dbg.c:513:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            info_len = strlen(amip->info);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/mem_dbg.c:519:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                buf_len = strlen(buf);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c:20:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int sz, len_0 = (int)strlen(filename) + 1;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c:46:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            MultiByteToWideChar(CP_UTF8, 0, mode, strlen(mode) + 1,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_fopen.c:68:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            newname = OPENSSL_malloc(strlen(filename) + 1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_str.c:35:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(str) + 1;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_str.c:93:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return l + strlen(src);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_str.c:158:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/o_str.c:246:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, err, buflen - 1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_dat.c:417:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            n = strlen(s);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_dat.c:483:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            i = strlen(bndec);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/objects/obj_dat.c:504:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            i = strlen(tbuf);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/ocsp/ocsp_ht.c:256:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for (r = q + strlen(q) - 1; isspace((unsigned char)*r); r--)
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_info.c:126:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((int)strlen(header) > 10) /* assume encrypted */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_info.c:149:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((int)strlen(header) > 10) /* assume encrypted */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_info.c:172:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((int)strlen(header) > 10) /* assume encrypted */
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_info.c:295:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            OPENSSL_assert(strlen(objstr) + 23
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:41:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        i = strlen(key);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:68:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        j = strlen(buf);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:107:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    j = strlen(buf);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:359:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        OPENSSL_assert(strlen(objstr) + 23 + 2 * EVP_CIPHER_iv_length(enc) + 13
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:599:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nlen = strlen(name);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:606:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(header);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:701:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            i = strlen(&(buf[11]));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:795:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(nameB->data);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:845:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int pem_len = strlen(pem_str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pem/pem_lib.c:846:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int suffix_len = strlen(suffix);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_utl.c:23:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        asclen = strlen(asc);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/pkcs12/p12_utl.c:78:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        asclen = strlen(asc);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_egd.c:103:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(path) >= sizeof(addr.sun_path))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_egd.c:106:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = offsetof(struct sockaddr_un, sun_path) + strlen(path);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_egd.c:168:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            num = read(fd, egdbuf, 1);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_egd.c:197:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            num = read(fd, retrievebuf + numbytes, egdbuf[0] - numbytes);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/rand_unix.c:248:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    r = read(fd, (unsigned char *)tmpbuf + n,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c:335:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(s);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/rand/randfile.c:340:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        } else if (len + strlen(RFILE) + 2 < size) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/txt_db/txt_db.c:69:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        i = strlen(&(buf->data[offset]));
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/txt_db/txt_db.c:199:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                l += strlen(pp[j]);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/by_dir.c:176:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strlen(ent->dir) == len &&
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/by_dir.c:253:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        j = strlen(ent->dir) + 1 + 8 + 6 + 1 + 1;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/by_dir.c:277:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            c = ent->dir[strlen(ent->dir) - 1];
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_cmp.c:45:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!EVP_DigestUpdate(ctx, (unsigned char *)f, strlen(f)))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_obj.c:56:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(buf, "NO X509_NAME", len);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_obj.c:70:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l1 = strlen(s);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_vfy.c:2641:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    recnum = (dane->umask & mask) ? sk_danetls_record_num(dane->trecs) : 0;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_vpm.c:47:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        namelen = name ? strlen(name) : 0;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509_vpm.c:264:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            srclen = strlen(src);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509name.c:328:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((const char *)bytes);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509/x509spki.c:37:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(str);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_alt.c:113:21:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                    strcat(oline, ":");
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_alt.c:458:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             strlen(value))) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_conf.c:192:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(p) < 9) || strncmp(p, "critical,", 9))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_conf.c:206:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(p) >= 4) && strncmp(p, "DER:", 4) == 0) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_conf.c:209:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if ((strlen(p) >= 5) && strncmp(p, "ASN1:", 5) == 0) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_cpols.c:197:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen(cnf->value)))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_cpols.c:268:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen(cnf->value)))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_cpols.c:283:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen(cnf->value)))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_ia5.c:54:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!ASN1_STRING_set((ASN1_STRING *)ia5, str, strlen(str))) {
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_info.c:77:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nlen = strlen(objtmp) + strlen(vtmp->name) + 5;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_info.c:77:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nlen = strlen(objtmp) + strlen(vtmp->name) + 5;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_ncons.c:459:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        hostlen = strlen(hostptr);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_pci.c:197:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            val_len = strlen(val->value + 5);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_prn.c:53:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(nval->value) + 1;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_prn.c:106:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(value) + 1;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_sxnet.c:148:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        userlen = strlen(user);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_sxnet.c:169:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        userlen = strlen(user);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:341:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    q = p + strlen(p) - 1;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:360:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmp);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:738:73:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
static int do_check_string(const ASN1_STRING *a, int cmp_type, equal_fn equal,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:784:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    equal_fn equal;
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:808:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chklen = strlen(chk);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:826:55:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
            if ((rv = do_check_string(cstr, alt_type, equal, flags,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:848:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if ((rv = do_check_string(str, -1, equal, flags,
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:866:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chklen = strlen(chk);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/crypto/x509v3/v3_utl.c:885:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chklen = strlen((char *)chk);
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/e_os.h:124:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define readsocket(s,b,n)           read((s),(b),(n))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/e_os.h:131:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define readsocket(s,b,n)       read((s),(b),(n))
data/shim-15+1533136590.3beb971/Cryptlib/OpenSSL/e_os.h:203:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#    define strlen(s) _strlen31(s)
data/shim-15+1533136590.3beb971/buildid.c:136:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			written = write(1, f, strlen(f));
data/shim-15+1533136590.3beb971/buildid.c:140:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			written = write(1, b, strlen(b));
data/shim-15+1533136590.3beb971/netboot.c:162:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(str);
data/shim-15+1533136590.3beb971/netboot.c:226:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	full_path = AllocateZeroPool(strlen(end)+strlen(template)+1);
data/shim-15+1533136590.3beb971/netboot.c:226:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	full_path = AllocateZeroPool(strlen(end)+strlen(template)+1);
data/shim-15+1533136590.3beb971/netboot.c:229:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy(full_path, end, strlen(end));
data/shim-15+1533136590.3beb971/netboot.c:233:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy(end, template, strlen(template));
data/shim-15+1533136590.3beb971/netboot.c:234:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end[strlen(template)] = '\0';
data/shim-15+1533136590.3beb971/netboot.c:258:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	INTN template_len = strlen(template) + 1;
data/shim-15+1533136590.3beb971/netboot.c:336:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	efi_status = pxe->Mtftp(pxe, read, *buffer, overwrite, bufsiz, &blksz,
data/shim-15+1533136590.3beb971/tpm.c:254:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 strlen(description) + 1, 0xd, NULL);

ANALYSIS SUMMARY:

Hits = 1241
Lines analyzed = 189201 in approximately 4.71 seconds (40211 lines/second)
Physical Source Lines of Code (SLOC) = 139238
Hits@level = [0] 109 [1] 215 [2] 918 [3]  17 [4]  87 [5]   4
Hits@level+ = [0+] 1350 [1+] 1241 [2+] 1026 [3+] 108 [4+]  91 [5+]   4
Hits/KSLOC@level+ = [0+] 9.69563 [1+] 8.9128 [2+] 7.36868 [3+] 0.77565 [4+] 0.653557 [5+] 0.0287278
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.