Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.h Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.h Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_timer.h Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_tab.h Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_tab.c Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.h Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.h Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem.c Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.h Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.h Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_timer.c Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem.h Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_elt_typ_liste.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr_priv.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille_priv.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille_chaine.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_priv.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_def.c Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille_chaine.c Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr.c Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr_chaine.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_att.c Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_att.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage_priv.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr_chaine.c Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille.c Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_def.h Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_med.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_med.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_med_priv.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_nopo.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ccm.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns_priv.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ccm.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_post.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_comm.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_cgns.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_comm.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_post.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens_priv.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_nopo.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.h Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_cgns.c Examining data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.h Examining data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_main.c Examining data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c Examining data/code-saturne-6.2.0+repack/build-aux/catalyst-5.6/CoProcessingTest.cxx Examining data/code-saturne-6.2.0+repack/build-aux/catalyst/CoProcessingTest.cxx Examining data/code-saturne-6.2.0+repack/docs/doxygen/keywords.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_remarks.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/richards.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_source_terms-scalar_in_a_channel.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_radiative_transfer.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/turbomachinery.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_coupling.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_electric_scaling.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cavitation.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_head_losses.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_parameters.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_source_terms.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/uspt1d.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_extra_operations-nusselt_calculation.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_gwf.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/bft_error_example.c Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_extra_operations_examples.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_initialization.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_solver.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_cooling_towers.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/condensation.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_physical_properties.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_f_user_parameters.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_boundary_conditions_examples.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_lagrangian_particle_tracking_module.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_boundary_conditions_ale.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_les_inflow.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/drift_coal_scalars.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_atmospheric_model.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/usthht.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/drift_scalars.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_modules.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_tabs.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_fluid_structure_interaction.h Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_performance_tuning.h Examining data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c Examining data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c Examining data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp Examining data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_random_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_moment_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_core_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_check_quadrature.c Examining data/code-saturne-6.2.0+repack/tests/fvm_selector_postfix_test.c Examining data/code-saturne-6.2.0+repack/tests/bft_mem_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_tree_test.c Examining data/code-saturne-6.2.0+repack/tests/fvm_selector_test.c Examining data/code-saturne-6.2.0+repack/tests/bft_error_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_check_sdm.c Examining data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c Examining data/code-saturne-6.2.0+repack/tests/cs_interface_test.c Examining data/code-saturne-6.2.0+repack/tests/bft_mem_usage_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_sizes_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_blas_test.c Examining data/code-saturne-6.2.0+repack/tests/bft_backtrace_test.c Examining data/code-saturne-6.2.0+repack/tests/bft_printf_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_map_test.c Examining data/code-saturne-6.2.0+repack/tests/cs_file_test.c Examining data/code-saturne-6.2.0+repack/libple/tests/ple_coupling_test.c Examining data/code-saturne-6.2.0+repack/libple/pyple/ple_coupling_wrapper.c Examining data/code-saturne-6.2.0+repack/libple/src/ple_defs.h Examining data/code-saturne-6.2.0+repack/libple/src/ple_coupling.h Examining data/code-saturne-6.2.0+repack/libple/src/ple_locator.c Examining data/code-saturne-6.2.0+repack/libple/src/ple_locator.h Examining data/code-saturne-6.2.0+repack/libple/src/ple_defs.c Examining data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c Examining data/code-saturne-6.2.0+repack/libple/src/ple_config_defs.h Examining data/code-saturne-6.2.0+repack/libple/examples/my_ple_mesh_priv.h Examining data/code-saturne-6.2.0+repack/libple/examples/my_ple_point_location.c Examining data/code-saturne-6.2.0+repack/libple/examples/my_ple_mesh.h Examining data/code-saturne-6.2.0+repack/libple/examples/my_ple_point_location.h Examining data/code-saturne-6.2.0+repack/libple/examples/my_ple_mesh.c Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.h Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_headers.h Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_ke.c Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_kw.h Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_rotation.h Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_inflow.c Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_kw.c Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_filter.h Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_rotation.c Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_bc.c Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_bc.h Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_model.c Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c Examining data/code-saturne-6.2.0+repack/src/turb/cs_clip_ke.h Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_model.h Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.h Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_ke.h Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_filter.c Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_inflow.h Examining data/code-saturne-6.2.0+repack/src/turb/cs_clip_ke.c Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_cfbl_headers.h Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_source_terms_step.c Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_thermo.c Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_cf_model.c Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_source_terms_step.h Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_thermo.h Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_phase_thermo.c Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_cf_model.h Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_phase_thermo.h Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_cf_thermo.h Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_cf_thermo.c Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_post_output.c Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_source_terms.c Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_boundary_function.c Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_fsi_struct.c Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_initialization.c Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_post_profile.c Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_volume_function.c Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_immersed_boundaries_inout.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_quality.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_geom.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_stl.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_geom.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_builder.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_extrude.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_adjacencies.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_refine.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_adjacencies.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_extrude.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_intersect.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_connect.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_bad_cells.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_thinwall.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_mesh.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_intersect.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coarsen.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_update.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_mesh.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_split.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_bad_cells.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_headers.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_warping.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_connect.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_update.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_boundary.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_partition.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_quantities.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_smoother.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_builder.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_save.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_boundary_layer.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_boundary.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coherency.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_thinwall.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_quality.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_remove.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_refine.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_smoother.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_halo.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coherency.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_boundary_layer.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_warping.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_halo.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_quantities.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_remove.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_from_builder.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coarsen.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_save.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.h Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_split.c Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_from_builder.c Examining data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr_headers.h Examining data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.h Examining data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_source_terms.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_modak.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_dir.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_bcs.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_pun.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_property_fields.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_restart.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_headers.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_dir.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_bcs.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_restart.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_property_fields.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_options.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_options.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_wall_flux.c Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_pun.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_source_terms.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_wall_flux.h Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_modak.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_headers.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_variables.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_tree_xml.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_particles.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_boundary_conditions.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_conjugate_heat_transfer.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_util.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_mesh.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_boundary_conditions.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_conjugate_heat_transfer.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_mobile_mesh.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_tree_xml.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_mesh.c Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_particles.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_mobile_mesh.h Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_util.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_box.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_convert_array.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_triangulate.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_triangulate.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_append.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_from_desc.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_tesselation.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_box.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_periodicity.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_headers.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_triangulate.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extract.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_periodicity.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_trace.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_defs.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_hilbert.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_project.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_point_location.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_priv.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_point_location.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_priv.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_morton.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_vtk_histogram.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_morton.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_append.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_defs.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_box_priv.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extract.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_from_desc.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_vtk_histogram.cxx Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_triangulate.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_group.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_convert_array.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extrude.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_project.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extrude.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_trace.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_tesselation.h Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.c Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_hilbert.c Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c Examining data/code-saturne-6.2.0+repack/src/atmo/cs_air_props.h Examining data/code-saturne-6.2.0+repack/src/atmo/cs_at_data_assim.h Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atprke.c Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.h Examining data/code-saturne-6.2.0+repack/src/atmo/cs_at_data_assim.c Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_headers.h Examining data/code-saturne-6.2.0+repack/src/atmo/cs_air_props.c Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.h Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atprke.h Examining data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_profile_std.c Examining data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.h Examining data/code-saturne-6.2.0+repack/src/atmo/cs_intprf.h Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol.h Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_profile_std.h Examining data/code-saturne-6.2.0+repack/src/atmo/cs_intprf.c Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol.c Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c Examining data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c Examining data/code-saturne-6.2.0+repack/src/base/cs_field.h Examining data/code-saturne-6.2.0+repack/src/base/cs_map.c Examining data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.h Examining data/code-saturne-6.2.0+repack/src/base/cs_notebook.c Examining data/code-saturne-6.2.0+repack/src/base/cs_post.h Examining data/code-saturne-6.2.0+repack/src/base/cs_restart_default.h Examining data/code-saturne-6.2.0+repack/src/base/cs_fp_exception.c Examining data/code-saturne-6.2.0+repack/src/base/cs_system_info.h Examining data/code-saturne-6.2.0+repack/src/base/cs_ast_coupling.c Examining data/code-saturne-6.2.0+repack/src/base/cs_ast_coupling.h Examining data/code-saturne-6.2.0+repack/src/base/cs_post.c Examining data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c Examining data/code-saturne-6.2.0+repack/src/base/cs_renumber.c Examining data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx Examining data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c Examining data/code-saturne-6.2.0+repack/src/base/cs_field_pointer.c Examining data/code-saturne-6.2.0+repack/src/base/cs_wall_functions.c Examining data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.h Examining data/code-saturne-6.2.0+repack/src/base/cs_timer.h Examining data/code-saturne-6.2.0+repack/src/base/cs_renumber.h Examining data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c Examining data/code-saturne-6.2.0+repack/src/base/cs_equation_iterative_solve.h Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary_conditions.c Examining data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_utils.cxx Examining data/code-saturne-6.2.0+repack/src/base/cs_selector.h Examining data/code-saturne-6.2.0+repack/src/base/cs_stokes_model.c Examining data/code-saturne-6.2.0+repack/src/base/cs_field_default.h Examining data/code-saturne-6.2.0+repack/src/base/cs_probe.h Examining data/code-saturne-6.2.0+repack/src/base/cs_control.h Examining data/code-saturne-6.2.0+repack/src/base/cs_sort.c Examining data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c Examining data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_coupling.cxx Examining data/code-saturne-6.2.0+repack/src/base/cs_param_types.c Examining data/code-saturne-6.2.0+repack/src/base/cs_time_step.h Examining data/code-saturne-6.2.0+repack/src/base/cs_array.c Examining data/code-saturne-6.2.0+repack/src/base/cs_opts.h Examining data/code-saturne-6.2.0+repack/src/base/cs_parall.h Examining data/code-saturne-6.2.0+repack/src/base/cs_order.c Examining data/code-saturne-6.2.0+repack/src/base/cs_mass_source_terms.c Examining data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.h Examining data/code-saturne-6.2.0+repack/src/base/cs_time_plot.h Examining data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.h Examining data/code-saturne-6.2.0+repack/src/base/cs_prototypes.h Examining data/code-saturne-6.2.0+repack/src/base/cs_param_types.h Examining data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.h Examining data/code-saturne-6.2.0+repack/src/base/cs_log.c Examining data/code-saturne-6.2.0+repack/src/base/cs_thermal_model.h Examining data/code-saturne-6.2.0+repack/src/base/cs_parameters_check.h Examining data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c Examining data/code-saturne-6.2.0+repack/src/base/cs_time_step.c Examining data/code-saturne-6.2.0+repack/src/base/cs_parall.c Examining data/code-saturne-6.2.0+repack/src/base/cs_interface.h Examining data/code-saturne-6.2.0+repack/src/base/cs_halo.h Examining data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.h Examining data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.c Examining data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c Examining data/code-saturne-6.2.0+repack/src/base/cs_volume_zone.c Examining data/code-saturne-6.2.0+repack/src/base/cs_selector.c Examining data/code-saturne-6.2.0+repack/src/base/cs_head_losses.h Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary.h Examining data/code-saturne-6.2.0+repack/src/base/cs_rotation.c Examining data/code-saturne-6.2.0+repack/src/base/cs_tree.c Examining data/code-saturne-6.2.0+repack/src/base/cs_porous_model.h Examining data/code-saturne-6.2.0+repack/src/base/cs_field_default.c Examining data/code-saturne-6.2.0+repack/src/base/cs_thermal_model.c Examining data/code-saturne-6.2.0+repack/src/base/cs_flag_check.c Examining data/code-saturne-6.2.0+repack/src/base/cs_wall_functions.h Examining data/code-saturne-6.2.0+repack/src/base/cs_fan.h Examining data/code-saturne-6.2.0+repack/src/base/cs_eos.cxx Examining data/code-saturne-6.2.0+repack/src/base/cs_random.h Examining data/code-saturne-6.2.0+repack/src/base/cs_ext_neighborhood.h Examining data/code-saturne-6.2.0+repack/src/base/cs_restart_map.h Examining data/code-saturne-6.2.0+repack/src/base/cs_search.h Examining data/code-saturne-6.2.0+repack/src/base/cs_halo_perio.c Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary_zone.h Examining data/code-saturne-6.2.0+repack/src/base/cs_calcium.c Examining data/code-saturne-6.2.0+repack/src/base/cs_field_operator.h Examining data/code-saturne-6.2.0+repack/src/base/cs_opts.c Examining data/code-saturne-6.2.0+repack/src/base/cs_head_losses.c Examining data/code-saturne-6.2.0+repack/src/base/cs_block_to_part.c Examining data/code-saturne-6.2.0+repack/src/base/cs_math.h Examining data/code-saturne-6.2.0+repack/src/base/cs_coupling.c Examining data/code-saturne-6.2.0+repack/src/base/cs_post_util.h Examining data/code-saturne-6.2.0+repack/src/base/cs_base.h Examining data/code-saturne-6.2.0+repack/src/base/cs_1d_wall_thermal_check.c Examining data/code-saturne-6.2.0+repack/src/base/cs_defs.c Examining data/code-saturne-6.2.0+repack/src/base/cs_volume_mass_injection.c Examining data/code-saturne-6.2.0+repack/src/base/cs_io.c Examining data/code-saturne-6.2.0+repack/src/base/cs_post_default.h Examining data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.h Examining data/code-saturne-6.2.0+repack/src/base/cs_1d_wall_thermal.c Examining data/code-saturne-6.2.0+repack/src/base/cs_file.h Examining data/code-saturne-6.2.0+repack/src/base/cs_1d_wall_thermal_check.h Examining data/code-saturne-6.2.0+repack/src/base/cs_notebook.h Examining data/code-saturne-6.2.0+repack/src/base/cs_range_set.h Examining data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c Examining data/code-saturne-6.2.0+repack/src/base/cs_field_operator.c Examining data/code-saturne-6.2.0+repack/src/base/cs_system_info.c Examining data/code-saturne-6.2.0+repack/src/base/cs_restart_map.c Examining data/code-saturne-6.2.0+repack/src/base/cs_assert.h Examining data/code-saturne-6.2.0+repack/src/base/cs_vof.h Examining data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.h Examining data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.h Examining data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c Examining data/code-saturne-6.2.0+repack/src/base/cs_interface.c Examining data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.h Examining data/code-saturne-6.2.0+repack/src/base/cs_restart.c Examining data/code-saturne-6.2.0+repack/src/base/cs_map.h Examining data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c Examining data/code-saturne-6.2.0+repack/src/base/cs_defs.h Examining data/code-saturne-6.2.0+repack/src/base/cs_control.c Examining data/code-saturne-6.2.0+repack/src/base/cs_array_reduce.c Examining data/code-saturne-6.2.0+repack/src/base/cs_block_dist.h Examining data/code-saturne-6.2.0+repack/src/base/cs_random.c Examining data/code-saturne-6.2.0+repack/src/base/cs_physical_constants.c Examining data/code-saturne-6.2.0+repack/src/base/cs_preprocess.h Examining data/code-saturne-6.2.0+repack/src/base/cs_preprocess.c Examining data/code-saturne-6.2.0+repack/src/base/cs_tree.h Examining data/code-saturne-6.2.0+repack/src/base/cs_interpolate.c Examining data/code-saturne-6.2.0+repack/src/base/cs_field.c Examining data/code-saturne-6.2.0+repack/src/base/cs_measures_util.c Examining data/code-saturne-6.2.0+repack/src/base/cs_measures_util.h Examining data/code-saturne-6.2.0+repack/src/base/cs_vof.c Examining data/code-saturne-6.2.0+repack/src/base/cs_block_dist.c Examining data/code-saturne-6.2.0+repack/src/base/cs_post_default.c Examining data/code-saturne-6.2.0+repack/src/base/cs_gas_mix.h Examining data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.h Examining data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c Examining data/code-saturne-6.2.0+repack/src/base/cs_field_pointer.h Examining data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx Examining data/code-saturne-6.2.0+repack/src/base/cs_stokes_model.h Examining data/code-saturne-6.2.0+repack/src/base/cs_coupling.h Examining data/code-saturne-6.2.0+repack/src/base/cs_base.c Examining data/code-saturne-6.2.0+repack/src/base/cs_volume_zone.h Examining data/code-saturne-6.2.0+repack/src/base/cs_halo_perio.h Examining data/code-saturne-6.2.0+repack/src/base/cs_coolprop.cxx Examining data/code-saturne-6.2.0+repack/src/base/cs_numbering.c Examining data/code-saturne-6.2.0+repack/src/base/cs_parameters_check.c Examining data/code-saturne-6.2.0+repack/src/base/cs_log_setup.c Examining data/code-saturne-6.2.0+repack/src/base/cs_volume_mass_injection.h Examining data/code-saturne-6.2.0+repack/src/base/cs_range_set.c Examining data/code-saturne-6.2.0+repack/src/base/cs_resource.h Examining data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.h Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary_zone.c Examining data/code-saturne-6.2.0+repack/src/base/cs_io.h Examining data/code-saturne-6.2.0+repack/src/base/cs_physical_constants.h Examining data/code-saturne-6.2.0+repack/src/base/cs_array.h Examining data/code-saturne-6.2.0+repack/src/base/cs_search.c Examining data/code-saturne-6.2.0+repack/src/base/cs_zone.h Examining data/code-saturne-6.2.0+repack/src/base/cs_log_setup.h Examining data/code-saturne-6.2.0+repack/src/base/cs_time_moment.h Examining data/code-saturne-6.2.0+repack/src/base/cs_math.c Examining data/code-saturne-6.2.0+repack/src/base/cs_restart.h Examining data/code-saturne-6.2.0+repack/src/base/cs_log.h Examining data/code-saturne-6.2.0+repack/src/base/cs_ale.h Examining data/code-saturne-6.2.0+repack/src/base/cs_rank_neighbors.h Examining data/code-saturne-6.2.0+repack/src/base/cs_block_to_part.h Examining data/code-saturne-6.2.0+repack/src/base/cs_1d_wall_thermal.h Examining data/code-saturne-6.2.0+repack/src/base/cs_order.h Examining data/code-saturne-6.2.0+repack/src/base/cs_fp_exception.h Examining data/code-saturne-6.2.0+repack/src/base/cs_part_to_block.c Examining data/code-saturne-6.2.0+repack/src/base/cs_halo.c Examining data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.h Examining data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c Examining data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx Examining data/code-saturne-6.2.0+repack/src/base/cs_gas_mix.c Examining data/code-saturne-6.2.0+repack/src/base/cs_mass_source_terms.h Examining data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c Examining data/code-saturne-6.2.0+repack/src/base/cs_base_headers.h Examining data/code-saturne-6.2.0+repack/src/base/cs_porous_model.c Examining data/code-saturne-6.2.0+repack/src/base/cs_rank_neighbors.c Examining data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c Examining data/code-saturne-6.2.0+repack/src/base/cs_part_to_block.h Examining data/code-saturne-6.2.0+repack/src/base/cs_sort.h Examining data/code-saturne-6.2.0+repack/src/base/cs_calcium.h Examining data/code-saturne-6.2.0+repack/src/base/cs_equation_iterative_solve.c Examining data/code-saturne-6.2.0+repack/src/base/cs_headers.h Examining data/code-saturne-6.2.0+repack/src/base/cs_fan.c Examining data/code-saturne-6.2.0+repack/src/base/cs_interpolate.h Examining data/code-saturne-6.2.0+repack/src/base/cs_file.c Examining data/code-saturne-6.2.0+repack/src/base/cs_timer.c Examining data/code-saturne-6.2.0+repack/src/base/cs_ale.c Examining data/code-saturne-6.2.0+repack/src/base/cs_post_util.c Examining data/code-saturne-6.2.0+repack/src/base/cs_flag_check.h Examining data/code-saturne-6.2.0+repack/src/base/cs_numbering.h Examining data/code-saturne-6.2.0+repack/src/base/cs_array_reduce.h Examining data/code-saturne-6.2.0+repack/src/base/cs_resource.c Examining data/code-saturne-6.2.0+repack/src/base/cs_parameters.h Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary_conditions.h Examining data/code-saturne-6.2.0+repack/src/base/cs_ext_neighborhood.c Examining data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c Examining data/code-saturne-6.2.0+repack/src/base/cs_probe.c Examining data/code-saturne-6.2.0+repack/src/base/cs_base_cuda.h Examining data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.h Examining data/code-saturne-6.2.0+repack/src/base/cs_rotation.h Examining data/code-saturne-6.2.0+repack/src/base/cs_parameters.c Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary.c Examining data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_turbomachinery.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_lagr_boundary_conditions.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_head_losses.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_zones.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_parameters.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_lagr_model.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_coupling.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_gwf.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_performance_tuning.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_radiative_transfer.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_source_terms.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_1d_wall_thermal.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_postprocess.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_extra_operations.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_mesh.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_radiative_transfer_bcs.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_boundary_conditions.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_lagr_particle.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_hgn.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_physical_properties.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_lagr_volume_conditions.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_electric_scaling.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_solver.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_porosity.c Examining data/code-saturne-6.2.0+repack/src/user/cs_user_initialization.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-vorticity_field.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_porosity-from_cad.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-base.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_performance_tuning-parallel-io.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_turbomachinery.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_hgn-relax_time_scale.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_lagr_boundary_conditions.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-scalar_balance.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_initialization-medcoupling_remapper_3d.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_coupling-syrthes.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_coupling-saturne.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_head_losses.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-stopping_criterion.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-cdo-condif.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-coupling.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-turbulence.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-volume_mass_injection.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_zones.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-input-save.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-quality.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_lagr_model.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-scalar_in_a_channel.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-probes-interpolate.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-momentum.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-linear_solvers.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_performance_tuning-matrix.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_cad_intersect.h Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_radiative_transfer.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_performance_tuning-partition.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-ctwr.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-sfc.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-cdo-gwf.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-turbomachinery.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-balance_by_zone.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-time_moments.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-modify.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_1d_wall_thermal.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-periodicity.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-boundary_forces.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-nusselt_and_friction_calculation.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-base.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-boundary_pressure_profile.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_gwf-example.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-boundary.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_radiative_transfer_bcs.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-medcoupling_remapper_2d.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-groups_from_free_faces.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-electric_arcs_ieljou_3_or_4.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_initialization-base.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-notebook.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-joining.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_lagr_particle.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_solver-heat-equation.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-fans.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_physical_properties.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_lagr_volume_conditions.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_lagr_particle-coal.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_electric_scaling.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_porosity.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-richards.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_performance_tuning-numbering.c Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_cad_intersect.cxx Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_log.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_coupling.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_dlvo.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_orientation.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_fragmentation.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_query.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_car.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_gradients.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_event.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_log.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_post.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_agglo.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_post.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_adh.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_options.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_extract.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_poisson.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_agglo.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_geom.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_resuspension.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_event.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_car.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_fragmentation.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_precipitation_model.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_poisson.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_adh.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_deposition_model.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_dlvo.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_orientation.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_options.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_extract.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_query.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_head_losses.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_geom.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_print.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_prototypes.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_coupling.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_precipitation_model.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_print.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_gradients.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde_model.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_resuspension.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_clogging.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_head_losses.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_headers.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_deposition_model.h Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde_model.c Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_clogging.h Examining data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.h Examining data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c Examining data/code-saturne-6.2.0+repack/src/elec/cs_elec_headers.h Examining data/code-saturne-6.2.0+repack/src/darc/cs_gwf_parameters.c Examining data/code-saturne-6.2.0+repack/src/darc/cs_gwf_physical_properties.h Examining data/code-saturne-6.2.0+repack/src/darc/cs_gwf_physical_properties.c Examining data/code-saturne-6.2.0+repack/src/darc/cs_darc_headers.h Examining data/code-saturne-6.2.0+repack/src/darc/cs_gwf_parameters.h Examining data/code-saturne-6.2.0+repack/src/pprt/cs_pprt_headers.h Examining data/code-saturne-6.2.0+repack/src/pprt/cs_combustion_model.h Examining data/code-saturne-6.2.0+repack/src/pprt/cs_combustion_model.c Examining data/code-saturne-6.2.0+repack/src/pprt/cs_physical_model.h Examining data/code-saturne-6.2.0+repack/src/pprt/cs_physical_model.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_vecteq.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_sles.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdoeb_vecteq.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_static_condensation.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_time.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_vecteq.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_coupling.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_scheme_geometry.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_priv.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_bc.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_flag.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_soil.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_flag.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_property.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_vecteq.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_main.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_assemble.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_local.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_ac.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_field_interpolation.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_walldistance.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_field_interpolation.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_advection.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdoeb_vecteq.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_basis_func.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_priv.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_reco.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_advection.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_soil.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_walldistance.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_maxwell.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_quadrature.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_system.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_assemble.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_maxwell.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_reco.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_sles.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hodge.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_mesh_deform.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hodge.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_scaleq.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdoeb_priv.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_main.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_thermal_system.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_scheme_geometry.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_basis_func.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain_setup.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_vecteq.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_priv.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_stokes.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_time.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_scaleq.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_cw_eval.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_property.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_builder.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_cw_eval.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain_setup.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_navsto.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_navsto.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_ac.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_builder.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_static_condensation.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_coupling.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_thermal_system.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_system.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_diffusion.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_bc.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_priv.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_stokes.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_local.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_predco.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_diffusion.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_mesh_deform.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_scaleq.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_predco.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_param_cdo.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_scaleq.h Examining data/code-saturne-6.2.0+repack/src/cdo/cs_quadrature.c Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_headers.h Examining data/code-saturne-6.2.0+repack/src/bft/bft_mem.h Examining data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c Examining data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.h Examining data/code-saturne-6.2.0+repack/src/bft/bft_mem.c Examining data/code-saturne-6.2.0+repack/src/bft/bft_error.h Examining data/code-saturne-6.2.0+repack/src/bft/cs_bft_headers.h Examining data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.h Examining data/code-saturne-6.2.0+repack/src/bft/bft_printf.h Examining data/code-saturne-6.2.0+repack/src/bft/bft_error.c Examining data/code-saturne-6.2.0+repack/src/bft/bft_printf.c Examining data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c Examining data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c Examining data/code-saturne-6.2.0+repack/src/apps/cs_solver.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_gradient_perio.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_multigrid_smoother.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_bad_cells_regularisation.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_default.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_blas.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_building.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_divergence.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_bad_cells_regularisation.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_face_viscosity.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_pc.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_bw_time_diff.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_it_priv.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_tuning.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_grid.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_priv.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_alge_headers.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_divergence.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_benchmark.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_tuning.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_grid.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_benchmark.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_multigrid_smoother.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_cell_to_vertex.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_default.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_balance.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_default.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_blas.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_default.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_it_priv.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_balance.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_pc.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler_priv.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_gradient.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_cell_to_vertex.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.h Examining data/code-saturne-6.2.0+repack/src/alge/cs_gradient_perio.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_building.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c Examining data/code-saturne-6.2.0+repack/src/alge/cs_face_viscosity.c Examining data/code-saturne-6.2.0+repack/examples/3-stratified_junction/case1/cs_user_postprocess.c Examining data/code-saturne-6.2.0+repack/examples/2-full_domain/case3/cs_user_parameters.c Examining data/code-saturne-6.2.0+repack/examples/2-full_domain/case3/cs_user_extra_operations.c Examining data/code-saturne-6.2.0+repack/examples/2-full_domain/case2/cs_user_parameters.c Examining data/code-saturne-6.2.0+repack/examples/2-full_domain/case1/cs_user_parameters.c FINAL RESULTS: data/code-saturne-6.2.0+repack/docs/doxygen/examples/bft_error_example.c:90:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, format, arg_ptr); data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:317:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system(cmd.c_str()); data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:425:46: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. unique_ptr<FILE, decltype(&pclose)> pipe(popen(cmd, "r"), pclose); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1192:18: [4] (misc) cuserid: Exactly what cuserid() does is poorly defined (e.g., some systems use the effective uid, like Linux, while others like System V use the real uid). Thus, you can't trust what it does. It's certainly not portable (The cuserid function was included in the 1988 version of POSIX, but removed from the 1990 version). Also, if passed a non-null parameter, there's a risk of a buffer overflow if the passed-in buffer is not at least L_cuserid characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired information instead. if ((char *)(cuserid(str_user)) == NULL) data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:334:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_group_name, group_name); data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:580:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(app_names, app_type); data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:582:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(app_names + rank_info[3], app_name); data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:613:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sendbuf, app_type); data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:617:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sendbuf + l_rank_info[3], app_name); data/code-saturne-6.2.0+repack/libple/src/ple_defs.c:169:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, format, arg_ptr); data/code-saturne-6.2.0+repack/libple/src/ple_defs.c:297:36: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static ple_printf_t *_ple_printf = vprintf; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:152:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_sys_info_cpu_string, s); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:206:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(str_date, ecs_glob_build_date); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:222:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(str_date, __TIME__); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:375:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(opt_str, _(" (default file: \"%s\")"), data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:388:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(opt_str, _(" (default file: \"%s\")"), data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:444:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(opt_str, data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:664:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(str_system, sys_config.sysname); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:666:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str_system, sys_config.release); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:667:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(str_machine, sys_config.nodename); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:924:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmd->nom_cas, argv[iarg]); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:975:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outfic_err, "%s.err", outfic); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1011:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmd->nom_out, outfic); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1114:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmd->fic_maillage, argv[iarg]); data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr.c:99:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(descr_loc->nom, nom); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:185:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(noms_groupes->val[ind], tab_nom_cpct.val[ind]); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:739:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(val_nom_grp + (pos_nom_grp[ind_grp] - 1), data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:216:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str_coul, "%s %d", _("Color"), (int)(coul_val[icoul])); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:307:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str_fam, "%s %d", _("Family"), min_fam_val + ifam); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post.c:85:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cas->nom_cas, nom_cas); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:115:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cas_cgns->nom_cas, nom_cas); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:244:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(base_cgns->nom_maillage, nom_maillage); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:273:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(base_cgns->nom_fic, "%s_%s.cgns", cas_cgns->nom_cas, nom_maillage); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:91:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nom_base, cas_ens->nom_cas); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:112:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cas_ens->prefixe_rep, nom_base); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:127:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cas_ens->nom_fic_case, cas_ens->prefixe_rep); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:128:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cas_ens->nom_fic_case, cas_ens->prefixe_fic); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:152:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cas_ens->prefixe_fic, nom_base); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:164:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cas_ens->nom_fic_case, nom_base); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:267:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cas_ens->nom_cas, nom_cas); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:388:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nom_fic_geo, cas_ens->prefixe_rep); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:389:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(nom_fic_geo, cas_ens->prefixe_fic); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:410:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nom_cas, cas_ens->prefixe_rep); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:99:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cas_med->nom_cas, nom_cas); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:104:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cas_med->nom_fic, nom_cas); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:246:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(maillage_med->nom_maillage, nom_maillage); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:286:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*env_path, cs_root_dir); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:287:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(*env_path, rel_path); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:288:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(*env_path, dir_path); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:323:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lib_path, "%s/%s.so", pkglibdir, dl_name); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:242:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(base->nom_fic, nom_fichier); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:900:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nom_tmp, nom_fam); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:948:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nom_boco_loc[ind_nom], nom_tmp); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1923:12: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. else if (sscanf(chaine, "%*s %*s %s", chaine_aux) != 1) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1946:12: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. else if (sscanf(chaine, "%*s %*s %s", chaine_aux) != 1) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2233:12: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. else if (sscanf(chaine, "%*s %*s %s", chaine_aux) != 1) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2257:12: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. else if (sscanf(chaine, "%*s %*s %s", chaine_aux) != 1) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2529:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if (sscanf(ligne, "%*s %d %d %s", data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2531:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if (sscanf(ligne, "%*s %d %s", data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2533:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if (sscanf(ligne, "%*s %s", data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2570:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nom_fic_geo + ind, nom_fic_geo_base); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:403:12: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. retour = sscanf(chaine, "%*s %s %*s %s", sch1, sch2); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:861:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*nom_grp, chaine + ind); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1101:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*nom_cl, ch_nom_cl); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:561:14: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. retval = sscanf(line, "%d %d %s", data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:593:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_phys_name[cpt_phys_names], name+s_id); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:655:14: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. retour = sscanf(chaine, " %s %s %s", data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:874:14: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. retour = sscanf(chaine, " %s %s %s", data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1628:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(ideas_grp_name, ssch); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1631:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(ideas_grp_name, ssch); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:111:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fic->nom_fic, nom_fichier); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:322:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nom_maillage_med, nom_maillage); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:502:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nom_maillage_med, nom_maillage); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1232:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nom_maillage_med, nom_maillage); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1638:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nom_maillage, nom_maillage_med); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:187:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_part->nom_part, nom_maillage); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:297:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_part->nom_typ_ele[this_part->nbr_typ_ele - 1], data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:360:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(nom_fam_med, str_num_fam_med); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:189:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bt->s_addr[i], s_addr); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:208:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bt->s_func[i], s_func); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:228:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bt->s_file[i], s_file); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:268:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comm->name, file_name); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c:301:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, format, arg_ptr); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:143:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fic_imp, ECS_LOC_IMP_FMT_CHAR "\n", "NULL"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:153:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fic_imp, ECS_LOC_IMP_FMT_INT "\n", val_imp); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:161:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fic_imp, ECS_LOC_IMP_FMT_REAL "\n", val_imp); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:169:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fic_imp, ECS_LOC_IMP_FMT_CHAR "\n", val_imp); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:177:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fic_imp, ECS_LOC_IMP_FMT_SIZE_T "\n", (unsigned long)val_imp); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:183:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fic_imp, ECS_LOC_IMP_FMT_PTR "\n", val); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:274:14: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. retval = vfprintf(f->ptr, format, arg_ptr); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:592:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(f->name, name); data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:224:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(v->name, name); data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:426:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_info->name, name); data/code-saturne-6.2.0+repack/src/alge/cs_matrix_tuning.c:293:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m_variant->name[j], mv_s->name[j]); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:600:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp_s[0], "%-36s", ""); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:631:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp_s[0], "%-36s", ""); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:998:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mg->post_name, name); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1079:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(var_name, "mg %s %2d", base_name, (ii+1)); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1115:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(var_name, "rk %s %2d", data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1200:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mgd->pc_name, name); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1238:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mgd->pc_name, name); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1263:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mgd->pc_name, name); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2811:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_lv_names[i*2], "%s:descent:%0*d", name, w, i); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2812:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_lv_names[i*2+1], "%s:ascent:%0*d", name, w, i); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2819:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_lv_names[i*2], "%s:coarse:%0*d", name, w, i); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:398:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sles->_name, name); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:855:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(val_name, base_name); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:857:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(val_name, name); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1224:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(retval->_name, name); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1938:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(val_name, base_name); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1940:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(val_name, name); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:225:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s_matrix.dat", name); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:231:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s_rhs.dat", name); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:242:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s_matrix.txt", name); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:248:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s_rhs.txt", name); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:259:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s_matrix.m", name); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:267:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s_rhs.m", name); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:273:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, format, arg_ptr); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1114:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1133:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1567:11: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, (double)(_data[i])); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1582:11: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, _data[i]); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1723:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(idx->names + idx->names_size, inp->name); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1727:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(idx->types + idx->types_size, inp->type_name); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2253:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(fmt, f_fmt); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2255:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(fmt, f_fmt); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2270:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(fmt, j, cmp1[i], cmp2[i]); data/code-saturne-6.2.0+repack/src/atmo/cs_at_data_assim.c:190:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s_%s", "measures", f->name); data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:626:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_atmo_chem.spack_file_name, "%s", file_name); data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:651:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_atmo_chem.aero_file_name, "%s", file_name); data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:686:9: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if (fscanf(file, "%s\n", line) != 1) data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:698:9: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if (fscanf(file, "%s\n", line) != 1) data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:724:9: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if (fscanf(file, "%s %lf\n", line, &(_atmo_chem.molar_mass[i])) != 2) data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:737:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, label); data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:378:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(namelist_ssh, cs_glob_atmo_chemistry->aero_file_name); data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:490:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, suffix); data/code-saturne-6.2.0+repack/src/base/cs_base.c:236:11: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vfprintf(_bft_printf_file, format, arg_ptr); data/code-saturne-6.2.0+repack/src/base/cs_base.c:338:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, format, arg_ptr); data/code-saturne-6.2.0+repack/src/base/cs_base.c:348:23: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__((format(printf, 1, 2))) data/code-saturne-6.2.0+repack/src/base/cs_base.c:796:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*env_path, cs_root_dir); data/code-saturne-6.2.0+repack/src/base/cs_base.c:797:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(*env_path, rel_path); data/code-saturne-6.2.0+repack/src/base/cs_base.c:798:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(*env_path, dir_path); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1072:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(app_name, argv[arg_id + 1]); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1098:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(app_name, buf + i); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1608:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(file_name, "%s.%0*d", base_name, n_dec, cs_glob_rank_id); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1612:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file_name, base_name); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1896:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(format, arg_ptr_2); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1909:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(_status_file, format, arg_ptr); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1987:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_bft_printf_file_name, log_name); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1988:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(_bft_printf_file_name, ext); data/code-saturne-6.2.0+repack/src/base/cs_base.c:2003:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_bft_printf_file_name, data/code-saturne-6.2.0+repack/src/base/cs_base.c:2049:28: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. bft_printf_proxy_set(vprintf); data/code-saturne-6.2.0+repack/src/base/cs_base.c:2051:31: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. ple_printf_function_set(vprintf); data/code-saturne-6.2.0+repack/src/base/cs_base.c:2380:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_f_name, "%s%s%s", datadir, subdir, base_name); data/code-saturne-6.2.0+repack/src/base/cs_base.c:2461:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lib_path, "%s%c%s.so", pkglibdir, DIR_SEPARATOR, name); data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:136:12: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vfprintf(_bft_printf_file, format, arg_ptr); data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:166:13: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. msgsize = vsprintf (cs_buf_print_f, format, arg_ptr); data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:168:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. msgsize = vsnprintf (cs_buf_print_f, CS_BUF_PRINT_F_SIZE, format, arg_ptr); data/code-saturne-6.2.0+repack/src/base/cs_control.c:648:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comm->port_name, port_name); data/code-saturne-6.2.0+repack/src/base/cs_control.c:1368:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(path, F_OK) == 0) data/code-saturne-6.2.0+repack/src/base/cs_field.c:2424:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name0, name); data/code-saturne-6.2.0+repack/src/base/cs_field.c:2640:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(kd->def_val.v_p, default_value); data/code-saturne-6.2.0+repack/src/base/cs_field.c:3264:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(kv->val.v_p, str); data/code-saturne-6.2.0+repack/src/base/cs_file.c:1842:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(f->name, name); data/code-saturne-6.2.0+repack/src/base/cs_file.c:3793:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dirnames[n_ent], ent->d_name); data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:632:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cpl->cells_criteria, criteria_cells); data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:636:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cpl->faces_criteria, criteria_faces); data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:658:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cpl->faces_criteria, group_name); data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:2665:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cpl->namesca, f->name); data/code-saturne-6.2.0+repack/src/base/cs_io.c:555:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(idx->names + idx->names_size, inp->sec_name); data/code-saturne-6.2.0+repack/src/base/cs_io.c:746:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(header_data, base_header); data/code-saturne-6.2.0+repack/src/base/cs_io.c:813:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpname, filename); data/code-saturne-6.2.0+repack/src/base/cs_io.c:1710:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *)(outp->buffer) + 56, sec_name); data/code-saturne-6.2.0+repack/src/base/cs_io.c:2366:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *)(inp->buffer + 56), header->sec_name); data/code-saturne-6.2.0+repack/src/base/cs_log.c:467:14: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. retval = vfprintf(_cs_log[log], format, arg_ptr); data/code-saturne-6.2.0+repack/src/base/cs_log.c:518:14: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. retval = vfprintf(_cs_log[log], format, arg_ptr); data/code-saturne-6.2.0+repack/src/base/cs_log.h:217:25: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__((format(printf, 2, 3))); data/code-saturne-6.2.0+repack/src/base/cs_map.c:166:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m->keys + m->keys_size, key); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:173:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->name, name); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:176:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->medfile_path, medfile_path); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:179:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->interp_method, interp_method); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:333:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fname, subdir); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:336:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(fname, filename); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:338:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(fname, _ext); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:223:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(r->name, name); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:228:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(r->medfile_path, medfile_path); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:233:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(r->field_names[i], field_names[i]); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_utils.cxx:578:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m->sel_criteria, selection_criteria); data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:258:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(e->description, description); data/code-saturne-6.2.0+repack/src/base/cs_opts.c:219:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(opts->app_name, argv[arg_id + 1]); data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_coupling.cxx:313:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(c->name, name); data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_coupling.cxx:506:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mesh->sel_criteria, select_criteria); data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:321:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(r->name, name); data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1184:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((_user_variable_defs + _n_user_variables)->name, name); data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1228:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((_user_variable_defs + _n_user_variables)->name, name); data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1229:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((_user_variable_defs + _n_user_variables)->ref_name, variable_name); data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1263:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((_user_property_defs + _n_user_properties)->name, name); data/code-saturne-6.2.0+repack/src/base/cs_parameters_check.h:81:25: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__((format(printf, 3, 4))); data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:212:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cs_glob_thermal_table->material, material); data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:252:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cs_glob_thermal_table->method, method); data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:295:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fvm_name, _porosity_from_scan_opt.file_name); data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:300:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fvm_name, _porosity_from_scan_opt.output_name); data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:304:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(fvm_name, suffix); data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:537:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_porosity_from_scan_opt.file_name, "%s", file_name); data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:562:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_porosity_from_scan_opt.output_name, "%s", output_name); data/code-saturne-6.2.0+repack/src/base/cs_post.c:1494:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name, "%s_%05d", post_mesh->name, ts->nt_cur); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3495:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->name, mesh_name); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3869:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wd->case_name, case_name); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3872:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wd->dir_name, dir_name); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3878:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wd->fmt_opts, fmt_opts); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3895:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_cs_post_default_format_options, wd->fmt_opts); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3939:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->name, mesh_name); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3943:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->criteria[0], cell_criteria); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4004:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->name, mesh_name); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4053:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->name, mesh_name); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4057:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->criteria[1], i_face_criteria); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4063:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->criteria[2], b_face_criteria); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4134:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->name, mesh_name); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4203:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->name, mesh_name); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4207:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->criteria[3], cell_criteria); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4271:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->name, mesh_name); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4461:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(post_mesh->name, post_base->name); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:203:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp_name, "%s%c%s", data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:480:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_dest, new_src); data/code-saturne-6.2.0+repack/src/base/cs_probe.c:277:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(label, name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:307:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(loc->name, h.sec_name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:875:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_sec_name, prefix); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:876:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(_sec_name, name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:879:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_sec_name, name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:882:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(_sec_name, postfix); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1698:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_writer->name, name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1710:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_writer->path, _path); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1748:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mw->prev_files[mw->n_prev_files - 1], fname); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2172:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name, _path); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2175:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(_name, name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2188:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name, _path); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2211:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_re_name, _path); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2215:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(_re_name, _subdir); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2224:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(_re_name, name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2243:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(restart->name, _name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2465:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((restart->location[restart->n_locations-1]).name, location_name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2518:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((_location_ref[_n_locations_ref-1]).name, location_name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3061:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sec_name, name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3062:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(sec_name, coords_postfix); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3079:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sec_name, name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3080:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(sec_name, cell_num_postfix); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3208:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sec_name, name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3209:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(sec_name, coords_postfix); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3245:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sec_name, name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3246:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(sec_name, cell_num_postfix); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:881:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(sec_name, key); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2248:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(sec_name, key); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2400:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(sec_name, key); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2545:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sec_name, "%s::%s", name, _coeff_name[c_id]); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2554:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sec_name, "rij::%s", _coeff_name[c_id]); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2693:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sec_name, "%s::%s", f->name, _coeff_name[c_id]); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1911:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(scb->app_name, saturne_name); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1917:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(scb->face_cpl_sel_c, boundary_cpl_criteria); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1923:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(scb->cell_cpl_sel_c, volume_cpl_criteria); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1929:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(scb->face_loc_sel_c, boundary_loc_criteria); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1935:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(scb->cell_loc_sel_c, volume_loc_criteria); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2045:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sat_coupling->sat_name, sat_name); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2057:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sat_coupling->face_cpl_sel, face_cpl_sel_c); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2061:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sat_coupling->cell_cpl_sel, cell_cpl_sel_c); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2066:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sat_coupling->face_loc_sel, face_loc_sel_c); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2070:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sat_coupling->cell_loc_sel, cell_loc_sel_c); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:569:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(coupled_mesh_name, _("SYRTHES %s cells"), syr_coupling->syr_name); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:601:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(coupled_mesh_name, _("SYRTHES %s faces"), syr_coupling->syr_name); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1370:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(syr_coupling->syr_name, syr_name); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1384:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(syr_coupling->face_sel, face_sel_criterion); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1388:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(syr_coupling->cell_sel, cell_sel_criterion); data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:343:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_syr_coupling_builder->app_name, ai.app_name); data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:517:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(scb->app_name, syrthes_name); data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:523:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(scb->face_sel_c, boundary_criteria); data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:529:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(scb->cell_sel_c, volume_criteria); data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:1721:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mt->name, s); data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2704:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(names + names_idx[j], name); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:304:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(file_name, "%s%s%s.csv", file_prefix, plot_name, "_coords"); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:644:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p->plot_name, plot_name); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:647:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(p->file_name, "%s%s.dat", file_prefix, plot_name); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:650:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(p->file_name, "%s%s.csv", file_prefix, plot_name); data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c:521:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s->label, label); data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c:526:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s->label, name); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:381:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(n->name, name); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:448:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(node->name, name); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:677:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *)node->value, val); data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:1266:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tbm->rotor_cells_c[r_id], cell_criteria); data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:200:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bt->s_addr[i], s_addr); data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:219:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bt->s_func[i], s_func); data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:239:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bt->s_file[i], s_file); data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:346:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s_cplus_func + l, bt->s_func[i] + j); data/code-saturne-6.2.0+repack/src/bft/bft_error.c:160:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, format, arg_ptr); data/code-saturne-6.2.0+repack/src/bft/bft_error.h:85:25: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__((format(printf, 4, 5))); data/code-saturne-6.2.0+repack/src/bft/bft_printf.c:99:55: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static bft_printf_proxy_t *_bft_printf_proxy = vprintf; data/code-saturne-6.2.0+repack/src/bft/bft_printf.h:83:25: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__((format(printf, 1, 2))); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:943:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(field_name, "%s_cells", adv->name); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:968:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(field_name, "%s_vertices", adv->name); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:992:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(field_name, "%s_boundary_flux", adv->name); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:160:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(desc, "%s", "Homogenous Dirichlet"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:163:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(desc, "%s", "Dirichlet"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:166:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(desc, "%s", "Homogeneous Neumann"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:169:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(desc, "%s", "Neumann"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:172:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(desc, "%s", "Robin"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:175:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(desc, "%s", "Sliding"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:178:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(desc, "%s", "Dirichlet on the tangential component"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1562:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_eqp->name, "%s:gkb_transfo", eqp->name); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2700:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_eqp->name, "%s", eqp->name); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2863:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_eqp->name, "%s:alu0", eqp->name); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2942:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(postlabel, "%s.Border", field->name); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:2212:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(postlabel, "%s.Border", field->name); data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_scaleq.c:3358:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(postlabel, "%s.UpwCoef", eqp->name); data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c:218:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s-sol-%04d.log", eqname, nt); data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c:222:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s-rhs-%04d.log", eqname, nt); data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:198:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(label, "%s.Courant", adv->name); data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:249:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(label, "%s.Peclet", eqp->name); data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:299:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(label, "%s.Fourier", pty->name); data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:138:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(label, "%s.Balance.%s", eq->param->name, tag); data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:2318:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(bdy_flux_name, "%s_normal_boundary_flux", eq->varname); data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:3325:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(postlabel, "%s.Balance", eqp->name); data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:3364:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(postlabel, "%s.BdyFlux", eqp->name); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.c:656:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "<CDO/%s> Monitoring", eqname); data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:570:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(pty_name, "%s_time", eq_name); data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:845:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s_diffusivity", eq_name); data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:873:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s_reaction", eq_name); data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:889:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s_precip", eq_name); data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:2573:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(pty_name, "%s_diff_pty", varname); data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.c:109:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(n, "%s_%2d", base_name, id); data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:396:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ct->criteria, zone_criteria); data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1830:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, suf); data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1831:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(label, suf); data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:160:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(send_chars + n_chars, gc->group_name[j]); data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:238:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(recv_chars + n_chars, gc->group_name[j]); data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:274:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dest->group_name[i], src->group_name[i]); data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:421:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_class->group_name[i], group_names[i]); data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:1152:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_nodal->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:1268:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_nodal->name, this_nodal->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:2363:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_nodal->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c:242:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_selector->group_name[0], set_group_names[0]); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c:247:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_selector->group_name[j], name); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:984:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pf->infix, infix); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1157:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pf->missing_operand[pf->n_missing_operands], missing); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:449:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp_name, "%s/%s", dir_path, file_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:462:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp_name, "%s/%s", dir_path, file_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1414:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1419:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->name, _name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1460:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->input_name, n); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:582:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(state_full_name, state_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:583:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(state_full_name, state_number); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3239:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(full_name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3243:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(full_name, vector_char2); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3244:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(full_name, vector_char1); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3271:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vect_short_name, short_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3273:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(full_name, vector_char2); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3274:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vect_short_name, vector_char1); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3450:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(full_name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3600:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_ccm_version_string, "%s", "CCMIO"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3684:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(writer->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3703:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(writer->mesh_filename, path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3707:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(writer->mesh_filename, writer->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3712:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(writer->mesh_basename, writer->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3716:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(writer->path, path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3880:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->mesh_filename, "%s%s-%s.ccmg", data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3885:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->mesh_basename, "%s-%s.ccmg", data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3891:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->mesh_filename, "%s%s.ccmg", w->path, w->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3894:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->mesh_basename, "%s.ccmg", w->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4090:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->solution_filename, "%s%s-%s.ccmp", data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4096:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->solution_filename, "%s%s.ccmp", data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:287:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:289:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(w->name, postfix); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:306:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->filename, path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:314:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(w->filename, w->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:577:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(writer->bases[i]->name, base_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:748:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sol_name, "Steady (%s)", data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:751:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sol_name, "Solution %3d (%s)", data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:2567:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_writer->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:290:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(var->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:381:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(line + l, "%32s ", description); /* Description max 49 chars, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:406:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(var->file_name, "%s.", this_case->file_name_prefix); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:408:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(var->file_name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:441:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(var->case_line, line); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:442:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(var->case_line, var->file_name + this_case->dir_name_length); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:526:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_case->geom_file_name, this_case->file_name_prefix); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:527:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(this_case->geom_file_name, extension); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:578:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_case->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:596:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_case->case_file_name, dir_prefix); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:607:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_case->file_name_prefix, this_case->case_file_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:810:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_case->part_name[i], part_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:478:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(var_name, "%s[%s]", c->name, tmpe); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:480:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(var_name, c->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:484:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(t_stamp, "_%s_%.4i", var_name, w->nt); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:494:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->file_name, "%s%s%s.txt", w->path, w->name, t_stamp); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:499:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->file_name, "%s%s%s.tex", w->path, w->name, t_stamp); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:505:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->file_name, "%s%s%s.png", w->path, w->name, t_stamp); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:561:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:564:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->path, path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1267:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(&component_name[i_dim * MED_SNAME_SIZE], data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1274:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(&component_name[i_dim * MED_SNAME_SIZE], data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1283:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(&component_name[i_dim * MED_SNAME_SIZE], data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4268:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(writer->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4283:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(writer->filename, path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4287:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(writer->filename, writer->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx:949:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(writer->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx:954:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(writer->name, _name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:187:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(c_name, "%s[%s]", c->name, tmpe); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:189:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(c_name, c->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:338:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:397:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tracefile_path, path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:400:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(tracefile_path, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:199:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->file_name, "%s%s%s.dat", w->path, w->name, t_stamp); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:201:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->file_name, "%s%s%s.csv", w->path, w->name, t_stamp); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:331:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:334:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->path, path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:186:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(file_name, "%scoords%s.dat", w->prefix, t_stamp); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:188:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(file_name, "%scoords%s.csv", w->prefix, t_stamp); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:340:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(plot_name, "%s[%s]", c->name, tmpe); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:342:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(plot_name, c->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:442:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:446:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(w->prefix, "%s%s_", path, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:450:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(w->prefix, path); data/code-saturne-6.2.0+repack/src/fvm/fvm_trace.h:45:19: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. {char str[256]; sprintf(str, "%s:%d", __FILE__, __LINE__); \ data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:525:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_name, "%s%s", wf->dl_prefix, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:662:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp_path, this_writer->path); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:687:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp_name, "%s_%s", this_writer->name, mesh_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:775:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_writer->mesh_names[i], name); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:845:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(closest_name, tmp_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1029:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp_options + i0, tmp_options + i1 + 1); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1051:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(format_options, tmp_options); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1134:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp_options + i0, tmp_options + i1 + 1); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1166:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_writer->name, name); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1179:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(this_writer->path, path); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:2434:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, comp3[component_id]); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:2438:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, comp6[component_id]); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:2440:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, comp9[component_id]); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:189:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(path0, param); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3090:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp, f->name); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3401:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(kdname, f->name); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3988:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, s_list); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:4126:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(label, "%s%1i", prefix, fluid_id); data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:853:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(probe_labels[i], pn); data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c:490:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_boundary->label[izone], label); data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c:493:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_boundary->nature[izone], nature); data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1592:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vars->model, name); data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1595:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vars->model_value, model); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1318:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(rubriq, "stat_bord_%s", data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_options.c:144:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cs_glob_lagr_boundary_interactions->nombrd[ipp], varname); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:362:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(class_name, _class_ext); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1144:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, _class_name); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1195:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, _comp_name); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1196:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, _class_name); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1245:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, _comp_name); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1246:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, _class_name); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3459:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mt->name, s); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5443:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(names + names_idx[i], name); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5465:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(names + names_idx[j], name); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:107:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "log%cJoin%02dDBG_%s_%04d.dat", CS_DIR_SEPARATOR, data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:139:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "log%cJoin%02dDBG_%s_%04d.dat", CS_DIR_SEPARATOR, data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:295:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name,"%s%02d%s%05d", data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:302:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name,"%s%02d", "WorkMesh_j", param.num); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:380:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name,"%s%05d", "LocalMesh_n", CS_MAX(cs_glob_rank_id, 0)); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:384:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name,"%s", "LocalMesh"); data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c:174:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name,"%s%02d%s%05d", data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:455:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name,"%s%02d", "AdjacentJoinFaces_j", join_param.num); data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:476:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name,"%s%02d", "JoinFacesAfterMerge_j", join_param.num); data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:556:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name,"%s%02d", "InteriorJoinedFaces_j", join_param.num); data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:580:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name,"%s%02d", "BoundaryJoinedFaces_j", join_param.num); data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:645:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name,"%s%02d", "CleanFaces_j", param.num); data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:702:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fullname, "log%cJoin%02dDBG_%s%04d.dat", DIR_SEPARATOR, data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:727:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name,"%s%02d%s%05d", basename, param.num, "_n", rank); data/code-saturne-6.2.0+repack/src/mesh/cs_join_split.c:1665:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(new_mesh_name,"%s%05d", "AfterSplitting_n", data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2151:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(join->criteria, sel_criteria); data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2174:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(logname, "log%cjoin_%02d%s%s.log", DIR_SEPARATOR, data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2177:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(join->log_name, logname); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:470:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mesh->group, name); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:485:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mesh->group + mesh->group_idx[n_groups_o], name); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:747:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(g_lst, g_cur); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:756:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(g_lst + size_tot, g_cur); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:675:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ml->select_str, criteria); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_save.c:178:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_name, "%s%c%s", data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:1677:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, errstr, errlist); data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:1722:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, errstr, errlist); data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2398:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:127:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(line, "%s", temp); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:138:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(line, temp); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:141:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(line, "%s", temp); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:152:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(line, temp); data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c:280:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buffer, name); data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c:285:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buffer, csca); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:236:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(postlabel, "%s.Error", field->name); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:248:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(postlabel, "%s.RefSol", field->name); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:311:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "Resume-%s-t%.f.log", eqname, time_step->t_cur); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:318:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "Resume-%s.log", eqname); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-time_moments.c:415:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mean_name, f->name); /* copy field name into the new var */ data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-time_moments.c:416:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(mean_name, extension); /* add the extension */ data/code-saturne-6.2.0+repack/tests/bft_error_test.c:47:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, format, arg_ptr); data/code-saturne-6.2.0+repack/tests/bft_printf_test.c:41:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. ret = vfprintf(stdout, format, arg_ptr); data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:70:10: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vfprintf(f, format, arg_ptr); data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:98:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, format, arg_ptr); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:121:26: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const cs_file_access_t access[5] = {CS_FILE_STDIO_SERIAL, data/code-saturne-6.2.0+repack/tests/cs_file_test.c:131:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const int access[1] = {CS_FILE_STDIO_SERIAL}; data/code-saturne-6.2.0+repack/tests/cs_file_test.c:183:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access[a_id] >= CS_FILE_MPI_INDEPENDENT) { data/code-saturne-6.2.0+repack/tests/cs_file_test.c:210:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access[a_id], data/code-saturne-6.2.0+repack/tests/cs_file_test.c:219:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access[a_id]); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:325:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access[a_id], data/code-saturne-6.2.0+repack/tests/cs_file_test.c:334:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access[a_id]); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:380:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access[a_id] < CS_FILE_MPI_INDEPENDENT) data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:245:10: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vfprintf(f, format, arg_ptr); data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:268:10: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vfprintf(f, format, arg_ptr); data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:290:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, format, arg_ptr); data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:72:10: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vfprintf(f, format, arg_ptr); data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:94:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, format, arg_ptr); data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:100:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(static_cast<unsigned int>(time(&t))); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_main.c:384:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("LANG") != NULL) data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_main.c:399:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. ecs_mem_init(getenv("CS_PREPROCESS_MEM_LOG")); data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_def.c:2592:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("CS_PREPROCESS_FOAM_2_VTK_SOURCE") != NULL) data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_def.c:2842:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("CS_PREPROCESS_MIN_EDGE_LEN") != NULL) { data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_def.c:2843:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. lng_are_min = atof(getenv("CS_PREPROCESS_MIN_EDGE_LEN")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:245:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("CS_ROOT_DIR") != NULL) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:246:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. cs_root_dir = getenv("CS_ROOT_DIR"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:252:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if (getenv("CFDSTUDY_ROOT_DIR") != NULL) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:253:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. cs_root_dir = getenv("CFDSTUDY_ROOT_DIR"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:763:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("CS_PREPROCESS_IGNORE_IDEAS_COO_SYS") != NULL) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:764:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (atoi(getenv("CS_PREPROCESS_IGNORE_IDEAS_COO_SYS")) > 0) { data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c:182:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *lang = getenv("LANG"); data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:3594:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *s = getenv("CS_THREAD_DEBUG"); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:206:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *p = getenv("CS_PETSC_SYSTEM_VIEWER"); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1410:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("CS_PETSC_SYSTEM_VIEWER") != NULL) data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2643:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("LANG") != NULL) data/code-saturne-6.2.0+repack/src/apps/cs_solver.c:611:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("LANG") != NULL) data/code-saturne-6.2.0+repack/src/base/cs_ast_coupling.c:1093:35: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *calcium_verbosity = getenv("CS_CALCIUM_VERBOSITY"); data/code-saturne-6.2.0+repack/src/base/cs_base.c:755:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("CS_ROOT_DIR") != NULL) { data/code-saturne-6.2.0+repack/src/base/cs_base.c:756:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. cs_root_dir = getenv("CS_ROOT_DIR"); data/code-saturne-6.2.0+repack/src/base/cs_base.c:762:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if (getenv("CFDSTUDY_ROOT_DIR") != NULL) { data/code-saturne-6.2.0+repack/src/base/cs_base.c:763:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. cs_root_dir = getenv("CFDSTUDY_ROOT_DIR"); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1319:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("PMI_RANK") != NULL) data/code-saturne-6.2.0+repack/src/base/cs_base.c:1322:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if (getenv("PCMPI") != NULL) /* Platform MPI */ data/code-saturne-6.2.0+repack/src/base/cs_base.c:1326:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("OMPI_MCA_ns_nds_vpid") != NULL) /* OpenMPI 1.2 */ data/code-saturne-6.2.0+repack/src/base/cs_base.c:1328:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if (getenv("OMPI_COMM_WORLD_RANK") != NULL) /* OpenMPI 1.3 + */ data/code-saturne-6.2.0+repack/src/base/cs_base.c:1335:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("SLURM_SRUN_COMM_HOST") != NULL) data/code-saturne-6.2.0+repack/src/base/cs_base.c:1595:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((base_name = getenv("CS_MEM_LOG")) != NULL) { data/code-saturne-6.2.0+repack/src/base/cs_base.c:1972:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *p = getenv("CS_LOG_TO_STDOUT"); data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:476:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *p = getenv("CS_LOG_TO_STDOUT"); data/code-saturne-6.2.0+repack/src/base/cs_log.c:167:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *lang = getenv("LANG"); data/code-saturne-6.2.0+repack/src/base/cs_log.c:303:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *lang = getenv("LANG"); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:5574:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = getenv("CS_RENUMBER"); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:5928:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = getenv("CS_RENUMBER"); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:5978:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = getenv("CS_RENUMBER"); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:6060:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = getenv("CS_RENUMBER"); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:6296:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = getenv("CS_RENUMBER"); data/code-saturne-6.2.0+repack/src/base/cs_resource.c:164:28: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *cs_maxtime = getenv("CS_MAXTIME"); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1255:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("FVM_SELECTOR_DEBUG")) { data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:879:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_real_t random; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:880:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:881:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random >= 0.5) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:921:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. double random; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:922:32: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_normal(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:925:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. + random * zis->diameter_variance; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1080:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_real_t random; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1081:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1083:64: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CS_LAGR_INTERF, 5.0 + 15.0 * random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.c:830:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_real_t random; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.c:831:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.c:833:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random < 0.25) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.c:839:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if (random > 0.625) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1004:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1006:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_precipitation_model.c:444:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_real_t random; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_precipitation_model.c:445:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_precipitation_model.c:447:64: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CS_LAGR_INTERF, 5.0 + 15.0 * random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:229:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_real_t random; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:301:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:303:61: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. posasp1[i + nasptot] = pow(seff[iclas] /_pi, 0.5) * random; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:304:42: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. posasp2[i + nasptot] = 2 * _pi * random; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:327:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:330:42: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. posasp2[i + nasptot] = 2 * _pi * random; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.c:2008:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_real_t random; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.c:2012:39: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.c:2029:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.c:2030:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. height_reent = random * (p_height - clust_consol_height); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:1415:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:1416:35: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_real_t scov_rand = (random * (*surface_coverage)); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:1686:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:1691:42: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. || (viscp >= visref_icoal && random >= trap)) { data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:221:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. double random[3]; data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:224:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_normal(3, random); data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:226:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. fluctuations[point_id*3 + coo_id] = random[coo_id]; data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2005:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2007:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. = (random < 0.5) ? -1. : 1.; data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2015:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2017:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. box_min_coord[coo_id] + random*box_length[coo_id]; data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2146:35: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2148:41: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. = box_min_coord[coo_id] + random*box_length[coo_id]; data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2157:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs_random_uniform(1, &random); data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2159:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. = (random < 0.5) ? -1. : 1.; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-linear_solvers.c:182:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *p = getenv("CS_USER_PETSC_MAT_VIEW"); data/code-saturne-6.2.0+repack/tests/cs_blas_test.c:129:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("PMI_RANK") != NULL) data/code-saturne-6.2.0+repack/tests/cs_blas_test.c:134:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("GMPI_ID") != NULL) /* In case we are using MPICH-GM */ data/code-saturne-6.2.0+repack/tests/cs_blas_test.c:138:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("OMPI_MCA_ns_nds_vpid") != NULL) /* OpenMPI 1.2 */ data/code-saturne-6.2.0+repack/tests/cs_blas_test.c:140:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if (getenv("OMPI_COMM_WORLD_RANK") != NULL) /* OpenMPI 1.3 and above */ data/code-saturne-6.2.0+repack/tests/cs_map_test.c:181:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. bft_mem_init(getenv("CS_MEM_LOG")); data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c:91:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("PMI_RANK") != NULL) data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c:95:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("OMPI_COMM_WORLD_RANK") != NULL) /* OpenMPI 1.3 and above */ data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c:548:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("CS_MEM_LOG") != NULL) { data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c:552:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. getenv("CS_MEM_LOG"), r_id); data/code-saturne-6.2.0+repack/tests/cs_moment_test.c:83:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(2); data/code-saturne-6.2.0+repack/tests/fvm_selector_postfix_test.c:89:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. bft_mem_init(getenv("CS_MEM_LOG")); data/code-saturne-6.2.0+repack/tests/fvm_selector_test.c:472:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. bft_mem_init(getenv("CS_MEM_LOG")); data/code-saturne-6.2.0+repack/build-aux/catalyst-5.6/CoProcessingTest.cxx:57:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int nSteps = atoi(argv[2]); data/code-saturne-6.2.0+repack/build-aux/catalyst/CoProcessingTest.cxx:57:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int nSteps = atoi(argv[2]); data/code-saturne-6.2.0+repack/examples/2-full_domain/case3/cs_user_extra_operations.c:153:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen("moy.dat", "a"); data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:176:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_rcv[13]; data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:327:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_rcv[13]; data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:350:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_rcv[2]; data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:376:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_rcv[20]; data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:409:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[13] = "disconnect "; data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:83:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[LNG_MAX_CHAINE_IDEAS + 2]; data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:101:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fic_lec = fopen(argv[1], "rb"); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:107:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fic_ecr = fopen(argv[2], "wb"); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:178:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ch_coord[3][LNG_MAX_CHAINE_IDEAS]; data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:194:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(chaine, " %24.16E %24.16E %24.16E\n", data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:498:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fic_maillage = fopen(nom_fic_maillage, "rb"); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1120:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fic_maillage = fopen(nom_fic_maillage, "wb"); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1171:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bufdh[5]; data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1175:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(bufdh, "%02d", dh->tm_mday); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1177:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(bufdh, "%02d", dh->tm_mon + 1); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1179:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(bufdh, "%04d", (dh->tm_year) % 100 + 2000); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1190:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_user[L_cuserid]; data/code-saturne-6.2.0+repack/libple/src/ple_locator.c:2673:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(local_var, distant_var, n_points_loc*nbytes); data/code-saturne-6.2.0+repack/libple/src/ple_locator.c:2689:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(distant_var, local_var, n_points_loc*nbytes); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:107:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _sys_info_cpu_string[81] = ""; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:125:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[81] ; /* Should be large enough for the data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:132:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen("/proc/cpuinfo", "r"); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:194:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_date [ECS_STR_SIZE]; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:200:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char nom_mois[12][4] data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:355:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opt_str[81]; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:534:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char post_type[8], data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:541:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(post_type, "ens"); /* default */ data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:550:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(post_type, "cgns"); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:560:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(post_type, "med"); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:592:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cmd->nom_cas, "preprocess"); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:611:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cmd->post_err, "ens"); /* default */ data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:631:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_date [ECS_STR_SIZE] = ""; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:632:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_system [ECS_STR_SIZE] = ""; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:633:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_machine [ECS_STR_SIZE] = ""; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:634:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_ram [ECS_STR_SIZE] = ""; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:635:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_user [ECS_STR_SIZE] = ""; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:636:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_directory[PATH_MAX] = ""; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:695:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str_user, " ("); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:714:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str_ram, "%lu", (unsigned long)ram); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:857:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fic = fopen(fic_name, "r")) == NULL) { data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:940:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cmd->nbr_dump = (ecs_int_t) atoi(argv[++iarg]); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1049:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (! (isdigit(argv[iarg_num][0]) && atoi(argv[iarg + 1]) > 0)) data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1064:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cmd->num_maillage[iarg_num] = atoi(argv[++iarg]); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1140:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cmd->nom_out, "mesh_input.csm"); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.h:65:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char post_err[8]; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.h:66:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char post_vol[8]; data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr.c:111:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(descr_loc->nom, "%d", ide); data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:472:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(maillage->vertex_coords + (n_vertices_ini*3), data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:922:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *nom_typ_c[2] = { data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:927:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *nom_table_def[2] = { data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:932:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *nom_table_att[2] = { data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:937:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *nom_elt_fam[2] = { data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:942:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *nom_connect[2] = { data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:947:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *nom_fam[2] = { data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:967:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("preprocessor_dump.txt", "w"); data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c:101:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pos_str[32]; /* Largement surdimensionné pour contenir une data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c:128:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(pos_str, "[%d]", (int)(pos_pas*ient + 1)); data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c:369:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(((ecs_int_t *)table_recept->val) + nbr_val_recept, data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c:746:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(this_table->pos, data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c:756:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(this_table->val, data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_att.c:1228:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fam_ref, elt_fam, n_elts*sizeof(int)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:180:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_num_coul[ECS_STR_SIZE]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:183:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const ent_msg_info_var_nbr_c[2] data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:204:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str_num_coul, "%d", max_coul_val); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:251:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_num_fam [ECS_STR_SIZE]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:254:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const ent_msg_info_var_nbr_c[ECS_N_ENTMAIL] data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:295:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str_num_fam, "%d", ECS_MAX(10, max_fam_val)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_med_priv.h:144:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_maillage_med[MED_NAME_SIZE + 1]; /* Nom MED */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:213:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_maillage_cgns[ECS_CGNS_TAILLE_NOM + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:92:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(nom_base, ".ensight"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:119:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cas_ens->prefixe_fic, "mesh"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:135:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(cas_ens->nom_fic_case, ".case"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:167:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(cas_ens->nom_fic_case, ".case"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:331:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ligne[83]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:361:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ligne_cas[81]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:390:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(nom_fic_geo, ".geo"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:416:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ligne_cas, "Case name: "); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:105:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(cas_med->nom_fic, ".med"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:182:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char desc_maillage_med[MED_COMMENT_SIZE + 1] = ""; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:184:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dtunit[MED_LNAME_SIZE + 1] = "s"; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:185:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char axisname[MED_SNAME_SIZE*3 + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:186:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char axisunit[MED_SNAME_SIZE*3 + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:121:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom[32]; /* Nom (et version) du format */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:122:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extension[8]; /* Extension de fichier */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:123:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cle[8]; /* Nom du type pour ligne de commande */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ccm.c:940:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[kCCMIOMaxStringLength + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:163:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom[ECS_CGNS_TAILLE_NOM + 1]; /* Nom de la section */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:179:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom[ECS_CGNS_TAILLE_NOM + 1]; /* Nom de la zone */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:230:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_tmp[ECS_CGNS_TAILLE_NOM + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:334:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_tmp[ECS_CGNS_TAILLE_NOM + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:420:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_tmp [ECS_CGNS_TAILLE_NOM + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:619:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_tmp_aux [ECS_CGNS_TAILLE_NOM + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:767:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_tmp [ECS_CGNS_TAILLE_NOM + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:768:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_fam [ECS_CGNS_TAILLE_NOM + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:3584:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_tmp[ECS_CGNS_TAILLE_NOM + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:132:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:216:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ligne[ECS_LOC_LNG_MAX_CHAINE_ENS], data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:250:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char * data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:252:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ligne[ECS_LOC_LNG_MAX_CHAINE_ENS] , data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:303:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ligne[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:304:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub[11]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:346:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val_lue = atoi(sub); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:375:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ligne[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:376:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub[13]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:445:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ligne[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:446:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub[13]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:483:45: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val_id[cpt_lignes_lues] = (int32_t)(atoi(sub)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:514:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ligne[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:515:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub[9]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:570:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val_lue = atoi(sub); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:803:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *nbr_som_elt = atoi(chaine+strlen("bar")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:807:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *nbr_som_elt = atoi(chaine+strlen("tria")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:811:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *nbr_som_elt = atoi(chaine+strlen("quad")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:815:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *nbr_som_elt = atoi(chaine+strlen("tetra")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:819:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *nbr_som_elt = atoi(chaine+strlen("pyramid")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:823:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *nbr_som_elt = atoi(chaine+strlen("penta")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:827:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *nbr_som_elt = atoi(chaine+strlen("hexa")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1746:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1865:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1866:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine_aux[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2178:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2179:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine_aux[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2314:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num_part_lu = atoi(chaine+strlen("part")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2438:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ligne[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2439:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_fic_geo_base[ECS_LOC_LNG_MAX_CHAINE_ENS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:297:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:324:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:352:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT]; /* Ligne lue */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:353:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sch1[ECS_LOC_LNG_MAX_CHAINE_GAMBIT]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:354:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sch2[ECS_LOC_LNG_MAX_CHAINE_GAMBIT]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:483:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:560:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT]; /* Ligne lue */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:566:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_som_lus[27][9]; /* Sommets lus */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:676:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_som_lus[inod], chaine + 15 + (inod_ligne*8), 8); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:695:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). som_elt[isom] = atoi(str_som_lus[ind_som_elt[isom]]); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:817:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:818:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ch_num_elt[9]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:820:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *mtyp_name[6] = { "Undefined", data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:912:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ch_num_elt, chaine + (ielgp_ligne*8), 8); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:913:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (*num_elt_grp)[ielgp] = atoi(ch_num_elt); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:949:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:950:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ch_num_elt[11]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:951:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ch_num_fac[6]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:952:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ch_nom_cl[33]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:955:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *nom_type[3] = { "node", data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:959:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *nom_ibcode[54] = { "UNSPECIFIED", /* 0 */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1030:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ch_nom_cl, chaine, 32); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1124:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ch_num_elt, chaine, 10); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1125:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ch_num_fac, chaine + 15, 5); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1127:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (*num_elt_cl)[ind] = atoi(ch_num_elt); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1128:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (*num_fac_cl)[ind] = atoi(ch_num_fac); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1684:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT]; /* Ligne lue */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:342:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:405:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:431:25: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nbr_nod = (ecs_int_t)(atol(chaine)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:528:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[ECS_LOC_LNG_MAX_CHAINE_GMSH]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:529:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ECS_LOC_LNG_MAX_CHAINE_GMSH]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:625:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const *phys_name, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:633:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[ECS_LOC_LNG_MAX_CHAINE_GMSH]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:711:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int tag = atoi(ssch); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:730:32: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned long n_phys = atol(ssch); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:740:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int phys_tag = atoi(ssch); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:768:35: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned long n_bound = atol(ssch); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:886:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1148:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1206:25: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nbr_elt = (ecs_int_t)(atol(chaine)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1275:15: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). label = atol(ssch); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1283:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type_gmsh = atoi(ssch); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1318:35: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nbr_tag_elt = (ecs_int_t)(atol(ssch)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1332:36: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). coul_elt = (ecs_int_t)(atol(ssch)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1349:32: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). coul_elt = (ecs_int_t)(atol(ssch)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1373:53: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num_nod_elt_gmsh[ind_nod_elt] = (ecs_int_t)(atol(ssch)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1640:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1831:55: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num_nod_elt_gmsh[ind_nod_elt] = (ecs_int_t)(atol(ssch)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2094:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH]; /* Ligne lue */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:466:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_atof[ECS_LOC_LNG_MAX_CHAINE_IDEAS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:541:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_IDEAS]; /* Ligne lue */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:549:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ideas_ch_val[3][ECS_LOC_LNG_MAX_CHAINE_IDEAS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:764:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(getenv("CS_PREPROCESS_IGNORE_IDEAS_COO_SYS")) > 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:800:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_IDEAS]; /* Ligne lue */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:806:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ideas_ch_coord[3][ECS_LOC_LNG_MAX_CHAINE_IDEAS]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:979:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_IDEAS]; /* Ligne lue */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1387:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_IDEAS]; /* Ligne lue */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1393:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ideas_grp_name[ECS_IDEAS_LEN_GROUP_NAME]; /* Nom du groupe */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1836:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chaine[ECS_LOC_LNG_MAX_CHAINE_IDEAS]; /* Ligne lue */ data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:318:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_maillage_med[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:453:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_maillage_med[MED_NAME_SIZE + 1] = ""; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:454:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_equiv[MED_NAME_SIZE+1] = ""; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:576:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_equiv_cmp[MED_NAME_SIZE+1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:577:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char desc_equiv[MED_COMMENT_SIZE+1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1211:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_maillage_med[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1214:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_fam_med[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1215:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char un_att_des_med[MED_COMMENT_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1216:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char un_grp_des_med[MED_LNAME_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1526:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_maillage_med[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1527:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char desc_maillage_med[MED_COMMENT_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1536:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dtunit[MED_LNAME_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1537:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char axisname[MED_SNAME_SIZE*3 + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1538:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char axisunit[MED_SNAME_SIZE*3 + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_nopo.c:1128:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nopo_e_0, &(nopo_e[0]), 8); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_cgns.c:207:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_section[32 + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_cgns.c:209:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *nom_coord[3] = {"CoordinateX", data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_cgns.c:402:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nom_section, "Section %2d", cpt_section); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:287:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(this_part->nom_typ_ele[this_part->nbr_typ_ele - 1], data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:292:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(this_part->nom_typ_ele[this_part->nbr_typ_ele - 1], data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:221:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_fam_med[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:222:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_num_fam_med[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:243:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str_num_fam_med, "%d", (int)num_fam_med); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:325:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom_fam_med[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:326:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_num_fam_med[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:355:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str_num_fam_med, "%d", (int)num_fam_med); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:359:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(nom_fam_med, "FAMILLE_"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:377:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_func_buf[67]; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:99:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char padding[128] = ""; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:188:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[64] = ""; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:229:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_pad[33] = ""; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:230:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type_pad[3] = ""; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:378:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datatype_name[8]; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:379:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_pad[8]; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:408:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(datatype_name, "i4"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:411:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(datatype_name, "i8"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:422:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(datatype_name, "r4"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:425:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(datatype_name, "r8"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:436:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(datatype_name, "u4"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:439:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(datatype_name, "u8"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:448:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(datatype_name, "u8"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:453:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(datatype_name, "c "); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:514:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header_pad[64]; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_elt_typ_liste.h:53:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nom[11]; /* Nom le plus long: polyhedron */ data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:700:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f->ptr = fopen(f->name, "a"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:703:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f->ptr = fopen(f->name, "w"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:719:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f->ptr = fopen(f->name, "r"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:728:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f->ptr = fopen(f->name, "ab"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:731:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f->ptr = fopen(f->name, "wb"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:747:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f->ptr = fopen(f->name, "rb"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:1586:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, ni); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:1713:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(fic_name, "r")) != NULL) { data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem.c:470:28: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _ecs_mem_global_file = fopen(log_file_name, "w"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:139:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; /* should be large enough for "/proc/%lu/status" data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:158:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "/proc/%lu/status", (unsigned long) pid); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:160:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(buf, O_RDONLY); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:296:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[81]; /* should be large enough for "/proc/%lu/status" */ data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:303:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "/proc/%lu/status", (unsigned long) pid); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:304:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(buf, "r"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:352:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[81]; /* should be large enough for "/proc/%lu/status" */ data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:361:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "/proc/%lu/psinfo", pid); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:363:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen (buf, "r"); data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.c:2361:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_surface_balance(const char *selection_crit, data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.c:2362:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *scalar_name, data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.c:2484:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_flux_through_surface(const char *scalar_name, data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.h:208:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_surface_balance(const char *selection_crit, data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.h:209:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *scalar_name, data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.h:240:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_flux_through_surface(const char *scalar_name, data/code-saturne-6.2.0+repack/src/alge/cs_benchmark.c:121:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *_matrix_operation_name[CS_MATRIX_N_FILL_TYPES][2] data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:96:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; /* Variant name */ data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:103:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vector_multiply_name[CS_MATRIX_N_FILL_TYPES][2][64]; data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:127:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *_matrix_fill_name[CS_MATRIX_N_FILL_TYPES] data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:135:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *_matrix_operation_name[CS_MATRIX_N_FILL_TYPES][2] data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:675:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(yr0, y, n_rows*_block_mult*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1014:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[81] = ""; data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1046:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[4][24] = {"", "", "", ""}; data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1063:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[24] = {""}; data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1090:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[32]; data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1141:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[81] = ""; data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1167:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[12][24] = {"", "", "", "", "", "", "", "", "", "", "", ""}; data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1216:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[32]; data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1293:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[12][24] = {"", "", "", "", "", "", "", "", "", "", "", ""}; data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1311:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[1][24] = {""}; data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1340:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[32]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:1677:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:3114:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:4246:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:5922:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:6890:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:8218:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:8985:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:9534:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:10233:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:10843:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:11207:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:11688:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:12081:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_divergence.c:447:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_divergence.c:984:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8617:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[32]; data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8623:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(var_name, "Work array"); data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8696:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[32]; data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8702:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(var_name, "Work array"); data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8776:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[32]; data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8782:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(var_name, "Work array"); data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:9039:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[32]; data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:9051:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(var_name, "Work array"); data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:1744:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(h->perio_lst, data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:1838:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(h->perio_lst, data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:6321:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c_row_num, tmp_num_1, n_base_rows*sizeof(int)); data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:6389:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(f_row_rank, tmp_rank_1, n_base_rows*sizeof(int)); data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:6429:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_var_1, c_var, g->n_rows*db_size[1]*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:6462:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(f_var, tmp_var_1, n_base_rows*db_size[1]*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:781:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mc->_da, da, matrix->db_size[3]*sizeof(cs_real_t) * ms->n_rows); data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:803:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mc->_xa, xa, matrix->eb_size[3]*xa_n_vals*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:1803:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_row_index, ms->_row_index, (ms->n_rows+1)*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:2785:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_row_index, ms->row_index, (ms->n_rows+1)*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:4400:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *func_name, data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:5364:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m, src, sizeof(cs_matrix_t)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:5417:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m, src, sizeof(cs_matrix_t)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:5449:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m_row, s_row, sizeof(cs_real_t)*eb_size[3]*n_cols); data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c:263:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpr_idx, ma->_r_idx, (n_rows+1)*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c:409:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpr_idx, ma->d_r_idx, (n_rows+1)*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c:3014:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ul[120]; data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c:3096:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mav->db_size, db_size, 4*sizeof(int)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c:3098:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mav->eb_size, eb_size, 4*sizeof(int)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix_priv.h:333:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[2][32]; /* Variant names */ data/code-saturne-6.2.0+repack/src/alge/cs_matrix_tuning.c:189:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_t, m, sizeof(cs_matrix_t)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.c:1249:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char flags[3] = {(unsigned char) sizeof(cs_gnum_t), data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.c:1294:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m_coords, _m_coords, n_entries*2*sizeof(cs_gnum_t)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.c:1303:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m_vals, _m_vals, n_entries*sizeof(double)); data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.c:1976:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[64]; data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:563:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[7][64] = {"", "", "", "", "", "", ""}; data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:564:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *stage_name[2] = {N_("Construction:"), N_("Resolution:")}; data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:565:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *lv_stage_name[7] = {N_("build:"), N_("solve:"), data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:3957:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(d->info), &(c->info), data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:3960:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, c, offsetof(cs_multigrid_t, n_levels_post)); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4565:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[32]; data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4611:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(var_name, "Diag_%04d", lv_id); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4621:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(var_name, "Diag_Dom_%04d", lv_id); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4655:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(var_name, "RHS_%04d", level); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4665:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(var_name, "X_%04d", level); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4696:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(var_name, "Residual_%04d", level); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid_smoother.c:837:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rk, vx, n_rows * sizeof(cs_real_t)); /* rk <- vx */ data/code-saturne-6.2.0+repack/src/alge/cs_multigrid_smoother.c:929:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rk, vx, n_rows * sizeof(cs_real_t)); /* rk <- vx */ data/code-saturne-6.2.0+repack/src/alge/cs_multigrid_smoother.c:1020:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rk, vx, n_rows * sizeof(cs_real_t)); /* rk <- vx */ data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:589:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s_old, s, sizeof(cs_sles_t)); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:830:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char base_name[32], val_name[32]; data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:850:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(base_name, "Residual"); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:995:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ul[128]; data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1873:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char base_name[32], val_name[32]; data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1906:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(base_name, "Diag"); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1911:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(base_name, "RHS"); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1912:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(val, rhs, n_rows*diag_block_size[1]*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1917:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(val, vx, n_rows*diag_block_size[1]*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1921:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(base_name, "Residual"); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1931:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(base_name, "Diag_Dom"); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:2040:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type_name[32]; data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:2046:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(type_name, "_fp_type"); data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:340:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dk, gk, n_rows * sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:717:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dk, gk, n_rows * sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:923:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dk, gk, n_rows * sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:1113:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dk, rk, n_rows * sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:1301:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dk, rk, n_rows * sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:1656:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rk, vx, n_rows * sizeof(cs_real_t)); /* rk <- vx */ data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:1776:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rk, vx, n_rows * sizeof(cs_real_t)); /* rk <- vx */ data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:1899:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rk, vx, n_rows * sizeof(cs_real_t)); /* rk <- vx */ data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:3596:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(s) > 0) data/code-saturne-6.2.0+repack/src/alge/cs_sles_it_priv.h:465:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, _sum, 5*sizeof(double)); data/code-saturne-6.2.0+repack/src/alge/cs_sles_it_priv.h:515:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, _sum, 4*sizeof(double)); data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c:709:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vx, rhs, n_rows*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c:785:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sym_type_name[32]; data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:156:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *mat_type[2]; /* PETSc matrix type string data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1572:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char norm_type_name[32]; data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:638:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header_buf[65]; data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:678:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inp.f = fopen(inp.filename, "rb"); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:842:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char **argv, data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1110:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[64] = " %10lu : %"; data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1129:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[64] = " %10lu : %"; data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1447:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_data, data, n_vals); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1563:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[64] = "%"; data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1578:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[64] = "%"; data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1744:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(idx->data + idx->data_size, data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1937:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, buffer, n_values); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2220:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *f_fmt, data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2249:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmt[128] = " %12llu: %22.15e | %22.15e\n"; data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2252:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(fmt, " %12llu: %"); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2254:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(fmt, " | %"); data/code-saturne-6.2.0+repack/src/atmo/cs_at_data_assim.c:189:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[50]; data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:715:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_at_opt_interp_read_file(char const filename[50], data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:721:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_LINE_SIZE]; data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:740:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fichier = fopen(filename, "r"); data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:748:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fichier = fopen(filename, "r"); data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:843:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fichier = fopen(filename, "r"); data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:881:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fichier = fopen(filename, "r"); data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.h:165:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_at_opt_interp_read_file(char const filename[50], data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:670:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[512] = ""; data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:676:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file = fopen(_atmo_chem.spack_file_name, "rt"); data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:719:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[512] = ""; data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:720:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[512] = ""; data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:735:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name, "species_"); data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:374:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namelist_ssh[41]; data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:376:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(namelist_ssh, "namelist.ssh"); data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:464:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[512] = ""; data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:478:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "aerosol_layer_%04d", ilr); data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:480:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name, "aerosol_num"); data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:488:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char suffix[5]; data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:489:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(suffix, "_%03d", isize); data/code-saturne-6.2.0+repack/src/base/cs_ale.c:1692:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_vtx_coord0, m->vtx_coord, m->n_vertices * sizeof(cs_real_3_t)); data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c:500:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dc->recv_count_save, dc->recv_count, sizeof(int)*(dc->n_ranks)); data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c:526:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dc->recv_count, dc->recv_count_save, sizeof(int)*(dc->n_ranks)); data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c:914:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d->recv_id + i, data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c:2115:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(src_rank, d->src_rank, d->n_elts_dest*sizeof(int)); data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c:2203:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[64]; data/code-saturne-6.2.0+repack/src/base/cs_ast_coupling.c:1095:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs_calcium_set_verbosity(atoi(calcium_verbosity)); data/code-saturne-6.2.0+repack/src/base/cs_base.c:145:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cs_glob_base_str[CS_BASE_N_STRINGS][CS_BASE_STRING_LEN + 1]; data/code-saturne-6.2.0+repack/src/base/cs_base.c:303:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_file_name[81]; data/code-saturne-6.2.0+repack/src/base/cs_base.c:308:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(err_file_name, "error"); data/code-saturne-6.2.0+repack/src/base/cs_base.c:330:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(err_file_name, "error_r%0*d", n_dec, cs_glob_rank_id); data/code-saturne-6.2.0+repack/src/base/cs_base.c:380:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sig_name[32] = ""; data/code-saturne-6.2.0+repack/src/base/cs_base.c:625:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_func_buf[67]; data/code-saturne-6.2.0+repack/src/base/cs_base.c:865:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_string[MPI_MAX_ERROR_STRING + 1]; data/code-saturne-6.2.0+repack/src/base/cs_base.c:869:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comm_name[MPI_MAX_OBJECT_NAME + 1]; data/code-saturne-6.2.0+repack/src/base/cs_base.c:1119:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[81]; data/code-saturne-6.2.0+repack/src/base/cs_base.c:1123:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char mon_name[12][4] data/code-saturne-6.2.0+repack/src/base/cs_base.c:1132:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mpi_vendor_lib[32] = ""; data/code-saturne-6.2.0+repack/src/base/cs_base.c:1133:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mpi_lib[32] = ""; data/code-saturne-6.2.0+repack/src/base/cs_base.c:1651:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char unit[8] = {'K', 'M', 'G', 'T', 'P', 'E', 'Z', 'Y'}; data/code-saturne-6.2.0+repack/src/base/cs_base.c:1904:24: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _status_file = fopen(_status_file_name, "w"); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1914:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/code-saturne-6.2.0+repack/src/base/cs_base.c:1974:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(p) > 0) data/code-saturne-6.2.0+repack/src/base/cs_base.c:2072:28: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _bft_printf_file = fopen(_bft_printf_file_name, "w"); data/code-saturne-6.2.0+repack/src/base/cs_base.c:2384:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(file_name, "r"); data/code-saturne-6.2.0+repack/src/base/cs_base.c:2586:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_func_buf[67]; data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:161:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cs_buf_print_f[CS_BUF_PRINT_F_SIZE]; data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:388:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dir, name, name_l); data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:428:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dir, datadir, datadir_l); data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:478:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(p) > 0) data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:486:26: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _bft_printf_file = fopen(name, "w"); data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:549:26: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _bft_printf_file = fopen(name, "a"); data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:677:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char descr[128]; data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:320:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _var_name[CS_CALCIUM_VARIABLE_LEN + 1]; data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:331:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_cmp[CS_CALCIUM_VARIABLE_LEN + 1]; data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:394:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _var_name[CS_CALCIUM_VARIABLE_LEN + 1]; data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:404:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_cmp[CS_CALCIUM_VARIABLE_LEN + 1]; data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:464:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _var_name[CS_CALCIUM_VARIABLE_LEN + 1]; data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:476:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_val, val, n_val * sizeof(int)); data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:518:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _var_name[CS_CALCIUM_VARIABLE_LEN + 1]; data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:529:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_val, val, n_val * sizeof(double)); data/code-saturne-6.2.0+repack/src/base/cs_control.c:252:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, ni); data/code-saturne-6.2.0+repack/src/base/cs_control.c:526:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port_num = atoi(comm->port_name + id + 1); data/code-saturne-6.2.0+repack/src/base/cs_control.c:563:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sock_addr.sin_addr, host_ent->h_addr_list[0], host_ent->h_length); data/code-saturne-6.2.0+repack/src/base/cs_control.c:1007:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reply[20] = "\0"; data/code-saturne-6.2.0+repack/src/base/cs_control.c:1008:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "get: %.3f", val); data/code-saturne-6.2.0+repack/src/base/cs_control.c:1266:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reply[5] = "0\0"; data/code-saturne-6.2.0+repack/src/base/cs_control.c:1287:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reply[5]; data/code-saturne-6.2.0+repack/src/base/cs_control.c:1288:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "%d", retcode); data/code-saturne-6.2.0+repack/src/base/cs_control.c:1395:28: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *control_file = fopen("control_file", "r"); data/code-saturne-6.2.0+repack/src/base/cs_control.c:1433:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reply[13] = "Iteration OK"; data/code-saturne-6.2.0+repack/src/base/cs_coupling.c:201:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *sync_name[2] = {N_("point-to-point or not synchronized"), data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c:133:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *buffer[2]; data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c:734:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, comp_size); data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c:739:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, comp_size); data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c:1823:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c:1845:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/code-saturne-6.2.0+repack/src/base/cs_field.c:2420:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _name0[128]; data/code-saturne-6.2.0+repack/src/base/cs_field.c:2457:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_str[64], c_ref[64]; data/code-saturne-6.2.0+repack/src/base/cs_field.c:2461:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(c_ref, "%d", _c_id); data/code-saturne-6.2.0+repack/src/base/cs_field.c:2696:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(kd->def_val.v_p, default_value, size); data/code-saturne-6.2.0+repack/src/base/cs_field.c:3384:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(kv->val.v_p, s, kd->type_size); data/code-saturne-6.2.0+repack/src/base/cs_field.c:3438:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, p, kd->type_size); data/code-saturne-6.2.0+repack/src/base/cs_field.c:3673:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[4][64] = {"", "", "", ""}; data/code-saturne-6.2.0+repack/src/base/cs_field.c:3958:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[4][64] = {"", "", "", ""}; data/code-saturne-6.2.0+repack/src/base/cs_field.c:4055:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_str[2][64] = {"", ""}; data/code-saturne-6.2.0+repack/src/base/cs_field.c:4162:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_s[64] = ""; data/code-saturne-6.2.0+repack/src/base/cs_field_pointer.c:402:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/base/cs_file.c:513:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, ni); data/code-saturne-6.2.0+repack/src/base/cs_file.c:541:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f->sh = fopen(f->name, "ab"); data/code-saturne-6.2.0+repack/src/base/cs_file.c:543:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f->sh = fopen(f->name, "a+b"); data/code-saturne-6.2.0+repack/src/base/cs_file.c:547:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f->sh = fopen(f->name, "wb"); data/code-saturne-6.2.0+repack/src/base/cs_file.c:549:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f->sh = fopen(f->name, "a+b"); data/code-saturne-6.2.0+repack/src/base/cs_file.c:553:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f->sh = fopen(f->name, "rb"); data/code-saturne-6.2.0+repack/src/base/cs_file.c:1198:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MPI_MAX_ERROR_STRING]; data/code-saturne-6.2.0+repack/src/base/cs_file.c:2235:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char _copybuf[1024]; data/code-saturne-6.2.0+repack/src/base/cs_file.c:2247:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(copybuf, buf, size*ni); data/code-saturne-6.2.0+repack/src/base/cs_file.c:2495:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(copybuf, buf, bufsize); data/code-saturne-6.2.0+repack/src/base/cs_file.c:3297:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *fmt[4] = {N_(" I/O read method: %s\n"), data/code-saturne-6.2.0+repack/src/base/cs_file.c:3334:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MPI_MAX_INFO_KEY + 1]; data/code-saturne-6.2.0+repack/src/base/cs_file.c:3696:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(fic_path, "r")) != NULL) { data/code-saturne-6.2.0+repack/src/base/cs_file.c:3846:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(fic_path, "r")) != NULL) { data/code-saturne-6.2.0+repack/src/base/cs_file.c:3906:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(path, "w")) != NULL) { data/code-saturne-6.2.0+repack/src/base/cs_flag_check.c:402:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[32]; data/code-saturne-6.2.0+repack/src/base/cs_interface.c:387:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tuples, tuples_tmp, sizeof(cs_gnum_t)*n_tuples*3); data/code-saturne-6.2.0+repack/src/base/cs_interface.c:1253:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_block_tuples + _n_block_tuples*3, data/code-saturne-6.2.0+repack/src/base/cs_interface.c:2734:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(itf->elt_id + start_id, tmp, l*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/base/cs_interface.c:2741:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(itf->match_id + start_id, tmp, l*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/base/cs_interface.c:3142:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_dest + j*stride_size, data/code-saturne-6.2.0+repack/src/base/cs_interface.c:3799:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_dest + j*stride_size, data/code-saturne-6.2.0+repack/src/base/cs_interface.c:4012:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_dest + r_buf_shift, send_buf + s_buf_shift, msg_size); data/code-saturne-6.2.0+repack/src/base/cs_interface.c:5306:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(itf->match_id, send_buf + j, itf->size*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:241:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesh_name[16] = "locator"; data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:652:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char group_name[64]; data/code-saturne-6.2.0+repack/src/base/cs_io.c:141:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char contents[64]; /* String describing file contents */ data/code-saturne-6.2.0+repack/src/base/cs_io.c:572:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(idx->data + idx->data_size, data/code-saturne-6.2.0+repack/src/base/cs_io.c:614:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header_data[128 + 24]; data/code-saturne-6.2.0+repack/src/base/cs_io.c:801:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _tmpname[128]; data/code-saturne-6.2.0+repack/src/base/cs_io.c:1422:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_elts, _buf, n_vals*cs_datatype_size[header->type_read]); data/code-saturne-6.2.0+repack/src/base/cs_io.c:1432:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)_elts)[header->n_vals] = '\0'; data/code-saturne-6.2.0+repack/src/base/cs_io.c:1717:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, elts, data_size); data/code-saturne-6.2.0+repack/src/base/cs_io.c:3159:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char unit[8] = {'K', 'M', 'G', 'T', 'P', 'E', 'Z', 'Y'}; data/code-saturne-6.2.0+repack/src/base/cs_io.c:3190:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_wtimes, log->wtimes, 3*sizeof(double)); data/code-saturne-6.2.0+repack/src/base/cs_log.c:121:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _cs_log[log] = fopen(_cs_log_name[log], "w"); data/code-saturne-6.2.0+repack/src/base/cs_log.c:413:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[33]) data/code-saturne-6.2.0+repack/src/base/cs_log.c:594:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char separator[81]; data/code-saturne-6.2.0+repack/src/base/cs_log.c:623:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[4][64] = {"", "", "", ""}; data/code-saturne-6.2.0+repack/src/base/cs_log.c:682:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[4][64] = {"", "", "", ""}; data/code-saturne-6.2.0+repack/src/base/cs_log.h:169:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[33]); data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:361:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[2][64] = {"", ""}; data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:438:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[2][64] = {"", ""}; data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:524:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[5][64] = {"", "", "", "", ""}; data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:866:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[5][64] = {"", "", "", "", ""}; data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:880:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vmin, _sstats_vmin, _sstats_val_size*sizeof(double)); data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:881:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vmax, _sstats_vmax, _sstats_val_size*sizeof(double)); data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:882:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vsum, _sstats_vsum, _sstats_val_size*sizeof(double)); data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:883:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wsum, _sstats_wsum, _sstats_val_size*sizeof(double)); data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:1211:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[5][64] = {"", "", "", "", ""}; data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:1222:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vmin, _clips_vmin, _clips_val_size*sizeof(double)); data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:1223:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vmax, _clips_vmax, _clips_val_size*sizeof(double)); data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:1224:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vcount, _clips_count, _clips_val_size*sizeof(cs_gnum_t)*2); data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:527:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file = fopen("cs_uncertain_output.dat", "w"); data/code-saturne-6.2.0+repack/src/base/cs_numbering.c:618:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(numbering->group_index, data/code-saturne-6.2.0+repack/src/base/cs_order.c:1400:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, tmp, n_elts*elt_size); data/code-saturne-6.2.0+repack/src/base/cs_parall.c:249:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char _locval[256]; data/code-saturne-6.2.0+repack/src/base/cs_parall.c:256:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(locval, val, data_size); data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:65:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char cs_sep_h1[80] = data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:67:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char cs_sep_h2[80] = data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:69:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char cs_sepline[80] = data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:71:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char cs_med_sepline[50] = data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:78:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:90:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:99:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:109:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/base/cs_param_types.h:702:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char cs_sep_h1[80]; data/code-saturne-6.2.0+repack/src/base/cs_param_types.h:703:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char cs_sep_h2[80]; data/code-saturne-6.2.0+repack/src/base/cs_param_types.h:704:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char cs_sepline[80]; data/code-saturne-6.2.0+repack/src/base/cs_param_types.h:705:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char cs_med_sepline[50]; data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:505:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_paramedmem_remapper_create(char *name, data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:506:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *sel_criteria, data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:507:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *file_name, data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:508:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *mesh_name, data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:903:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&eqp, &_equation_param_default, sizeof(cs_equation_param_t)); data/code-saturne-6.2.0+repack/src/base/cs_parameters_check.c:213:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char underline[81]; data/code-saturne-6.2.0+repack/src/base/cs_part_to_block.c:294:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(send_buf, part_values, d->n_part_ents*stride_size); data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:251:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cs_glob_thermal_table->method, "EOS_"); data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:154:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[512]; data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:179:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* file = fopen(_porosity_from_scan_opt.file_name, "rt"); data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:302:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char suffix[13]; data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:303:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(suffix, "_%02d", n_scan); data/code-saturne-6.2.0+repack/src/base/cs_post.c:279:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *criteria[5]; /* Base selection criteria for data/code-saturne-6.2.0+repack/src/base/cs_post.c:503:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char frequency_s[80] = ""; data/code-saturne-6.2.0+repack/src/base/cs_post.c:2413:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fam_flag, _fam_flag, (mesh->n_families + 1)*sizeof(int)); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2474:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char part_name[81]; data/code-saturne-6.2.0+repack/src/base/cs_post.c:2550:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(part_name, "vol: "); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2633:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(part_name, "surf: "); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2882:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *name, data/code-saturne-6.2.0+repack/src/base/cs_post.c:2883:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_buf[96]) data/code-saturne-6.2.0+repack/src/base/cs_post.c:3070:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char interpolate_input[96]; data/code-saturne-6.2.0+repack/src/base/cs_post.c:3173:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char interpolate_input[96]; data/code-saturne-6.2.0+repack/src/base/cs_post.c:3274:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_buf[96]; data/code-saturne-6.2.0+repack/src/base/cs_post.c:3360:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char interpolate_input[96]; data/code-saturne-6.2.0+repack/src/base/cs_post.c:4462:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(post_mesh->name, _(" edges")); data/code-saturne-6.2.0+repack/src/base/cs_post.c:7181:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char part_name[81]; data/code-saturne-6.2.0+repack/src/base/cs_post.c:7221:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(part_name, "isolated: "); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:451:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(saved_names, data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:556:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh->group + group_end, "%d", color_id); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1148:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_matrix, matrix, 12*sizeof(double)); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1190:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_a, a, sizeof(double)*12); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1327:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_m, matrix, 12*sizeof(double)); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1771:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perio_num = atoi(header.sec_name + strlen("periodicity_type_")); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1786:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). == atoi(header.sec_name + strlen("periodicity_matrix_"))); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1806:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perio_id = atoi(header.sec_name data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1927:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_preprocessor_data_add_file(const char *file_name, data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1929:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char **group_rename, data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1981:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(f->data, file_name, l); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1988:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(f->data + data_size, transf_matrix, l); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2014:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_old_group_names[i], group_rename[i*2], l); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2019:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_new_group_names[i], group_rename[i*2+1], l); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2158:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cell_bi_ref, data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2170:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(mesh_builder->cell_bi), data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.h:87:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_preprocessor_data_add_file(const char *file_name, data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.h:89:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char **group_rename, data/code-saturne-6.2.0+repack/src/base/cs_probe.c:963:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_probe_set_create_from_segment(const char *name, data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1373:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pset->interpolation = atoi(keyval); data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1421:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pset->coords, data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1616:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[16]; data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1716:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pset->coords_ini, data/code-saturne-6.2.0+repack/src/base/cs_probe.h:311:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_probe_set_create_from_segment(const char *name, data/code-saturne-6.2.0+repack/src/base/cs_prototypes.h:906:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *object_name, data/code-saturne-6.2.0+repack/src/base/cs_range_set.c:843:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, d_size); data/code-saturne-6.2.0+repack/src/base/cs_range_set.c:861:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, d_size); data/code-saturne-6.2.0+repack/src/base/cs_range_set.c:945:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, d_size); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:299:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(old_family, family, n_elts*sizeof(int)); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:328:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(old_r_gen, r_gen, n_elts); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:367:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_global, _global_num, n_elts*sizeof(cs_gnum_t)); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:547:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(face_cells_tmp, data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:560:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(face_cells_tmp, data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:580:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cell_cells_idx_old, data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:583:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cell_cells_lst_old, data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:620:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gcell_vtx_idx_old, data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:623:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gcell_vtx_lst_old, data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:696:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(face_vtx_idx_old, face_vtx_idx, (n_faces+1)*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:697:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(face_vtx_old, face_vtx, connect_size*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:746:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(i_face_cells_old, mesh->i_face_cells, n_i_faces*sizeof(cs_lnum_2_t)); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:807:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b_face_cells_old, mesh->b_face_cells, n_b_faces*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:865:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(face_vtx_old, face_vtx, connect_size*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:898:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx_coord_old, mesh->vtx_coord, 3*n_vertices*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:1161:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_idx, a->idx, (a->n_elts+1)*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:1989:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(t_cell_index_prev, data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:2107:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(t_cell_index, data/code-saturne-6.2.0+repack/src/base/cs_resource.c:362:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *_f = fopen("run_status.exceeded_time_limit", "w"); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2204:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _subdir[19]; data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2205:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(_subdir, "previous_dump_%04d", mw->n_prev_files_tot); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:339:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _sec_name[128]; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:430:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128] = ""; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:431:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char old_name_x[96] = "", old_name_y[96] = "", old_name_z[96] = ""; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:432:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char old_name_xx[96] = "", old_name_yy[96] = "", old_name_zz[96] = ""; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:433:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char old_name_xy[96] = "", old_name_yz[96] = "", old_name_xz[96] = ""; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:439:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char old_name[96] = ""; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:450:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). scalar_id = atoi(name) - 1; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:688:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128] = ""; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:690:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *prefix[2] = {"fm_", "fm_a_"}; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:796:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:880:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(sec_name, "fields:"); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:979:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:1096:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:1103:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char old_sec_name[128]; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:1850:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name_buf + sizes[1], f->name, l); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2247:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(sec_name, "fields:"); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2399:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(sec_name, "fields:"); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2474:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char old_name_xx[128] = "", old_name_yy[128] = "", old_name_zz[128] = ""; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2475:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char old_name_xy[128] = "", old_name_yz[128] = "", old_name_xz[128] = ""; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2742:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128], ref_sec_name[128]; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2907:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:889:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char coupled_mesh_name[64]; data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:952:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(coupled_mesh_name, _("coupled_cells_%d"), *numcpl); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:964:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(coupled_mesh_name, _("coupled_faces_%d"), *numcpl); data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.c:165:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char _sample_buffer[1024]; data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.c:267:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(rfilename, "DistribOutput_l%02d.dat", loop_id1); data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.c:271:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbg_file = fopen(rfilename, "w"); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:278:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _op_name_send[33]; data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:483:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char op_name_send[32 + 1]; data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:484:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char op_name_recv[32 + 1]; data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:489:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(op_name_send, "coupling:location:incomplete"); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:493:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(op_name_send, "coupling:location:ok"); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1251:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char op_name_send[32 + 1]; data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1252:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char op_name_recv[32 + 1]; data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1259:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(op_name_send, "coupling:start"); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1537:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char op_name_send[32 + 1]; data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1538:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char op_name_recv[32 + 1]; data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:147:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen("/proc/cpuinfo", "r"); data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:207:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen("/etc/issue", "r"); data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:319:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_date[81]; data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:320:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_cpu[81]; data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:321:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_issue[81]; data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:322:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_directory[PATH_MAX] = ""; data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:731:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sd_desc[256]; data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:1716:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2190:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2191:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[4][64] = {"", "", "", ""}; data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2248:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2249:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[8][64] = {"", "", "", "", "", "", "", ""}; data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2380:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[3][64] = {"", "", ""}; data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2420:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[6][64] = {"", "", "", "", "", ""}; data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2581:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2792:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:177:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _f = fopen(p->file_name, "w"); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:306:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _f = fopen(file_name, "w"); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:361:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _f = fopen(p->file_name, "w"); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:437:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _f = fopen(p->file_name, "w"); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:542:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _f = fopen(p->file_name, "w"); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:705:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). p->f = fopen(p->file_name, "a"); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1191:24: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p->buffer_end += sprintf(p->buffer + p->buffer_end, " %8d", tn); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1193:24: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p->buffer_end += sprintf(p->buffer + p->buffer_end, " %14.7e", t); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1197:24: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p->buffer_end += sprintf(p->buffer + p->buffer_end, " %14.7e", data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1208:24: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p->buffer_end += sprintf(p->buffer + p->buffer_end, "%8d", tn); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1210:24: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p->buffer_end += sprintf(p->buffer + p->buffer_end, "%14.7e", t); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1214:24: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p->buffer_end += sprintf(p->buffer + p->buffer_end, ", %14.7e", data/code-saturne-6.2.0+repack/src/base/cs_tree.c:152:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _name[128]; data/code-saturne-6.2.0+repack/src/base/cs_tree.c:784:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(node->value, val, node->size*sizeof(bool)); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:887:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(node->value, val, node->size*sizeof(int)); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:990:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(node->value, val, node->size*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1188:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _shift[65] = ""; data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1204:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(shift, " "); data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:452:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->vtx_coord, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:460:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->i_face_cells, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:466:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->b_face_cells, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:472:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->i_face_vtx_idx, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:479:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->i_face_vtx_lst, mesh->i_face_vtx_lst, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:483:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->b_face_vtx_idx, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:491:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->b_face_vtx_lst, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:507:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->global_cell_num, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:514:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->global_i_face_num, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:521:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->global_b_face_num, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:528:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->global_vtx_num, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:556:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->b_cells, mesh->b_cells, mesh->n_b_cells*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:565:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->group_idx, mesh->group_idx, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:568:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->group, mesh->group, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:578:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->family_item, mesh->family_item, n_elts*sizeof(int)); data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:582:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->cell_family, mesh->cell_family, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:586:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->i_face_family, mesh->i_face_family, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:591:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->b_face_family, mesh->b_face_family, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:597:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh_copy->i_face_r_gen, mesh->i_face_r_gen, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:1240:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_turbomachinery_add_rotor(const char *cell_criteria, data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.h:97:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_turbomachinery_add_rotor(const char *cell_criteria, data/code-saturne-6.2.0+repack/src/bft/bft_mem.c:622:28: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _bft_mem_global_file = fopen(log_file_name, "w"); data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:375:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[81]; /* should be large enough for "/proc/%lu/status" data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:393:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "/proc/%lu/status", (unsigned long) pid); data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:394:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(buf, "r"); data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:530:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[81]; /* should be large enough for "/proc/%lu/status" */ data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:535:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "/proc/%lu/status", (unsigned long) pid); data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:536:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(buf, "r"); data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:592:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[81]; /* should be large enough for "/proc/%lu/status" */ data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:598:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "/proc/%05lu", (unsigned long) pid); data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:600:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). procfile = open(buf, O_RDONLY); data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:630:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[81]; /* should be large enough for "/proc/%lu/status" */ data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:639:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "/proc/%lu/psinfo", pid); data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:641:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen (buf, "r"); data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:669:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[81]; /* should be large enough for "/proc/%lu/status" */ data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:674:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "/proc/%05lu", (unsigned long) pid); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:477:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[256]; data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:542:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " Definition"); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:552:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " Definition %2d", ib); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1391:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cell_values, ai->values, data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1410:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cell_values, field->val, 3*cdoq->n_cells*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1603:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx_values, ai->values, 3*cdoq->n_vertices*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1633:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx_values, field->val, data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1837:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(flx_values, ai->values + n_i_faces, sizeof(cs_real_t)*n_b_faces); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1883:15: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(flx_values, val, sizeof(cs_real_t)*n_b_faces); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1912:15: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(flx_values, field->val, sizeof(cs_real_t)*n_b_faces); data/code-saturne-6.2.0+repack/src/cdo/cs_basis_func.c:1460:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *labels[20] = {"0", "x", "y", "z", data/code-saturne-6.2.0+repack/src/cdo/cs_basis_func.c:2305:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *labels[15] = {"0" , "x" , "y" , data/code-saturne-6.2.0+repack/src/cdo/cs_basis_func.c:2779:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fout = fopen(fname, "w"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:756:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(edge_gnum, _g_num, n_edges*sizeof(cs_gnum_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:993:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(face_gnum, mesh->global_i_face_num, data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:1461:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fname, "DumpConnect.%05d.dat", cs_glob_rank_id); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:1465:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fname, "DumpConnect.dat"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:1467:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fdump = fopen(fname, "w"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_diffusion.c:1414:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dir_val, csys->dir_values, n_f*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_field_interpolation.c:207:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx_values, f->val, mesh->n_vertices*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_field_interpolation.c:258:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(face_values, _face_values, data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c:1184:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fname, "DumpQuantities.%05d.dat", cs_glob_rank_id); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c:1188:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fname, "DumpQuantities.dat"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c:1190:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fdump = fopen(fname, "w"); data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c:1328:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pvol_ec, cdoq->pvol_ec, c2e->idx[n_cells]*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdoeb_vecteq.c:1068:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->edge_values_pre, eqc->edge_values, sizeof(cs_real_t)*n_edges); data/code-saturne-6.2.0+repack/src/cdo/cs_cdoeb_vecteq.c:1123:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->edge_values_pre, eqc->edge_values, data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_ac.c:276:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values_pre, eqc->face_values, data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_ac.c:280:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cc->mass_flux_array_pre, cc->mass_flux_array, data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_ac.c:1428:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cc->mass_flux_array_pre, cc->mass_flux_array, data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c:161:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mom_eqc->face_values_pre, mom_eqc->face_values, data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c:165:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cc->mass_flux_array_pre, cc->mass_flux_array, data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c:850:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_div, div_op, 3*cm->n_fc*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c:899:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_div, div_op, 3*n_f*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c:2350:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cc->mass_flux_array_pre, cc->mass_flux_array, data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1583:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gkb->b_tilda, b_f, gkb->n_u_dofs*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1697:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gkb->b_tilda, gkb->v, gkb->n_u_dofs*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1906:38: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uza->info->tol = fmax(uza->info->atol, uza->info->rtol*uza->info->res0); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2360:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsol + 3*n_faces, msles->p_c, n_cells*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2361:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b + 3*n_faces, msles->b_c, n_cells*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2434:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msles->p_c, xsol + 3*n_faces, n_cells*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_navsto.c:881:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char descr[32]; data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:1368:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fld->val_pre, c_vals, quant->n_cells*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:1384:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values_pre, eqc->face_values, data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:1610:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fld->val, cell_values, quant->n_cells*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:1807:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*n_faces); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2088:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*n_faces); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2164:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values_pre, eqc->face_values, data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2420:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*n_faces); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2906:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values_pre, eqc->face_values, data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:3053:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:3131:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:928:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*3*n_faces); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:1158:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*3*n_faces); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:1430:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*3*n_faces); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:2175:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values_pre, eqc->face_values, data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:2323:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:2401:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c:745:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->cell_values_pre, eqc->cell_values, bsize); data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c:1566:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->cell_values, cell_values, quant->n_cells*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c:3256:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c:3302:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c:3339:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->cell_values_pre, eqc->cell_values, data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c:156:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fout = fopen(fname, "w"); data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:204:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, eq->rhs, eq->n_sles_scatter_elts * sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:227:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(x, f_values, eq->n_sles_scatter_elts * sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_bc.c:860:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(values, array_input->values, data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.c:564:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsol, x, n_scatter_dofs*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:1532:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). eqp->sles_param.n_max_iter = atoi(keyval); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:1670:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). eqp->sles_param.verbosity = atoi(keyval); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:1782:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). eqp->verbosity = atoi(keyval); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2114:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst->enforcement_ref_value, ref->enforcement_ref_value, data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2121:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst->enforced_cell_ids, ref->enforced_cell_ids, data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2128:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst->enforced_dof_values, ref->enforced_dof_values, data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2138:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst->enforced_dof_ids, ref->enforced_dof_ids, data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2145:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst->enforced_dof_values, ref->enforced_dof_values, data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2301:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val[CS_BASE_STRING_LEN]; data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2478:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[256]; data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2579:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char desc[128]; data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2584:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " Definition %3d", id); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2599:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " Definition %3d", i); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2620:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " Time Hodge op. "); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2631:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " Diffusion Hodge op. "); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2642:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " Curl-curl Hodge op. "); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2653:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " Grad-Div Hodge op. "); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2723:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " Reaction Hodge op. "); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2735:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " Definition %3d", s_id); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:3856:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqp->enforced_dof_ids, elt_ids, n_elts*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:3870:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqp->enforced_dof_values, elt_values, size*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:3930:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqp->enforced_cell_ids, elt_ids, n_elts*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:3944:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqp->enforced_cell_values, elt_values, size*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:1248:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(values + 3*c_id, const_vec, 3*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:1256:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(values+3*c_id, const_vec, 3*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2427:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + 3*v_id, input, _3real); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2436:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + 3*selected_lst[i], input, _3real); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2501:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + 3*f_id, input, _3real); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2510:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + 3*selected_lst[f], input, _3real); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2523:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + def->dim*f_id, input, s); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2532:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + def->dim*selected_lst[f], input, s); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2591:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + 3*c_id, input, _3real); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2598:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + 3*z->elt_ids[i], input, _3real); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2610:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + def->dim*c_id, input, s); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2617:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + def->dim*z->elt_ids[i], input, s); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2977:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + def->dim*f_id, input, s); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2998:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + def->dim*selected_lst[f], input, s); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:3135:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval, val, stride*sizeof(cs_real_t)*cs_cdo_quant->n_cells); data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:3154:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval + stride*c_id, val + stride*c_id, data/code-saturne-6.2.0+repack/src/cdo/cs_gwf.c:416:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gw->head_in_law, hydraulic_head_cells, data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_soil.c:964:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meta[64]; data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_soil.c:972:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(meta, " Soil.%d | Model |", soil->id); data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:396:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c_w_save, c_w, quant->n_vertices*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_hho_scaleq.c:1424:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values, solu, sizeof(cs_real_t)*eqc->n_dofs); data/code-saturne-6.2.0+repack/src/cdo/cs_hho_scaleq.c:1521:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/cdo/cs_hho_scaleq.c:1600:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/cdo/cs_hho_vecteq.c:1542:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eqc->face_values, solu, sizeof(cs_real_t)*eqc->n_dofs); data/code-saturne-6.2.0+repack/src/cdo/cs_hho_vecteq.c:1639:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/cdo/cs_hho_vecteq.c:1718:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/cdo/cs_hodge.c:99:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/cdo/cs_hodge.c:107:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/cdo/cs_hodge.c:1531:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char _empty_prefix[2] = ""; data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.c:110:34: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). double atol, data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.c:119:16: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). info->atol = atol; data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.c:164:59: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). a_info->tol = fmax(a_info->rtol*a_info->res0, a_info->atol); data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.h:98:36: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). double atol; data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.h:204:34: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). double atol, data/code-saturne-6.2.0+repack/src/cdo/cs_mesh_deform.c:244:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_b_zone_ids, boundary_zone_ids, sizeof(int)*_n_b_zones); data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:83:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:94:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:106:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:115:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:121:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:130:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:138:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:471:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val[CS_BASE_STRING_LEN]; data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:583:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nsp->sles_param.il_algo_verbosity = atoi(val); data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:587:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nsp->sles_param.n_max_il_algo_iter = atoi(val); data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:591:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nsp->sles_param.n_max_nl_algo_iter = atoi(val); data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:639:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nsp->sles_param.nl_algo_verbosity = atoi(val); data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:786:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nsp->verbosity = atoi(val); data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:824:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cvalue[36]; /* include '\0' */ data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1011:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[256]; data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1018:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " * NavSto | Velocity.Init.Cond | Definition %2d", i); data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1027:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " * NavSto | Pressure.Init.Cond | Definition %2d", i); data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_system.c:1122:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nsp->solid_cell_ids, solid_cell_ids, n_solid_cells*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:1190:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *zname, data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:2000:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[256]; data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:2038:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prefix, " Definition %3d", j); data/code-saturne-6.2.0+repack/src/cdo/cs_property.h:490:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *zname, data/code-saturne-6.2.0+repack/src/cdo/cs_quadrature.c:84:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c:180:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c->val, m->val, sizeof(cs_real_t)*m->n_rows*m->n_cols); data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c:531:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m->val, mref->val, sizeof(cs_real_t)*m->n_max_rows*m->n_max_cols); data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c:1438:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(facto, m->val, n*n*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c:2207:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fout = fopen(fname, "w"); data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c:2326:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fout = fopen(fname, "w"); data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.h:488:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(recv->val, send->val, sizeof(cs_real_t)*send->n_rows*send->n_cols); data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.h:588:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b->val + i*nc, _start, sizeof(cs_real_t)*nc); data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:65:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char _state_names[CS_SOLIDIFICATION_N_STATES][32] = { data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:1915:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(alloy->tk_bulk, temp, csize); data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:1916:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(alloy->ck_bulk, conc, csize); data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:3431:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(alloy->c_l_cells, alloy->c_bulk->val, n_cells*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:3434:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(alloy->tk_bulk, solid->temperature->val, n_cells*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:3435:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(alloy->ck_bulk, alloy->c_bulk->val, n_cells*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:3440:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(alloy->c_l_faces, c_bulk_faces, quant->n_faces*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_xdef.c:682:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char _empty_prefix[2] = ""; data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_cw_eval.h:466:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eval, (const cs_real_t *)input, 3*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_cw_eval.h:506:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eval, array_input->values + 3*cm->f_ids[f], 3*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_cw_eval.h:586:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eval, array_input->values + 9*cm->f_ids[f], 9*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.c:738:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eval, array_input->values, n_elts * sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.c:845:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eval, array_input->values, stride*n_elts * sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.c:977:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eval, array_input->values, n_elts*stride * sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.c:1177:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eval, values, field->dim*n_elts * sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:405:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ct->name, "cooling_towers_%02d", ct->num); data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:471:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ct->file_name, "cooling_towers_balance.%02d", ct->num); data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:473:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(ct->file_name, "a"); data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:645:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model_type[16]; data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:848:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(ct->file_name, "a"); data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:415:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:763:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[LG_MAX]; data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1827:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name, "esl_fraction_"); data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1828:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(label, "YM_ESL"); data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1829:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(suf, "%02d", igaz + 1); data/code-saturne-6.2.0+repack/src/fvm/fvm_box.c:656:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char XYZ[3] = "XYZ"; data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.c:794:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, sizeof(fvm_box_tree_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.c:800:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest->nodes, src->nodes, dest->n_nodes * sizeof(_node_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.c:801:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest->child_ids, data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.c:806:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest->box_ids, data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:1275:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(send_global_num, data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:2018:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(this_io_num->_global_num, tmp_num, n_entities*sizeof(cs_gnum_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:2047:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(this_io_num->_global_num, tmp_num, n_entities*sizeof(cs_gnum_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:2220:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_adjacency, adjacency, n_entities*stride*sizeof(cs_gnum_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:2347:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_index, index, (n_entities+1)*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:2348:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_adjacency, adjacency, index[n_entities]*sizeof(cs_gnum_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_morton.c:548:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(rfilename, "DistribOutput_l%02d.dat", loop_id1); data/code-saturne-6.2.0+repack/src/fvm/fvm_morton.c:552:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbg_file = fopen(rfilename, "w"); data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.c:386:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(old_e_num, n->elt_num, n_elts*sizeof(cs_gnum_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.c:387:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(old_index, n->neighbor_index, (n_elts + 1)*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.c:388:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(old_n_num, n->neighbor_num, n_neighbors*sizeof(cs_gnum_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.c:948:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(n->elt_num, data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:1789:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_vertex_coords, vertex_coords, n_vertices*dim*sizeof(cs_coord_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extract.c:878:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(g_vtx_num, fvm_io_num_get_global_num(global_io_num), size); data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extract.c:936:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)g_elt_num, data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extract.c:986:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vertex_coords, coords, sizeof(cs_coord_t) * n_vertices * dim); data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_from_desc.c:1496:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(section->gc_id, cell_gc_id, section->n_elements*sizeof(int)); data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.c:157:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(connect, tmp_connect, stride * nb_ent * sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.c:201:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(connect_num, tmp_connect, data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.c:218:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(connect_idx, tmp_connect, (size_t)(nb_ent + 1) * sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.c:254:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gc_id, tmp_gc_id, nb_ent * sizeof(int)); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:196:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; /* Operator name string */ data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:367:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(this_parser->keywords + this_parser->keywords_size, data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:881:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stack->elements, stack->_elements, stack->size*sizeof(_stack_entry_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1453:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *token[2], data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1526:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *token[2], data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1923:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *t[3] = {NULL, NULL, NULL}; data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:3140:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eval_stack, _eval_stack, BASE_STACK_SIZE*sizeof(bool)); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:216:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(path, "r"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:235:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1709:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _name[128]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:213:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _ccm_version_string[32] = {"CCM"}; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:574:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char state_number[20]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:578:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(state_number, "%lu", w->state_counter); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:841:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char solver_info[128]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:842:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(solver_info, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3110:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vect_short_name[7]=""; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3111:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vector_char1[2] = "X"; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3112:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vector_char2[2] = "X"; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3238:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(full_name, "CS_"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3390:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char short_name[15]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3449:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(full_name, "CS_"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3708:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(writer->mesh_filename, ".ccmg"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3713:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(writer->mesh_basename, ".ccmg"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3875:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_time_step[16] =""; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3876:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s_time_step, "%d", w->mesh_time.last_time_step); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4085:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_time_step[16] =""; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4086:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s_time_step, "%d", time_step); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:239:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cgns_version_string[32] = ""; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:315:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(w->filename, ".cgns"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:717:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sol_name[FVM_CGNS_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1052:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section_name[FVM_CGNS_NAME_SIZE + 1], data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1060:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "Edges_%d", section_id); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1065:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "Triangles_%d", section_id); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1070:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "Quadrangles_%d", section_id); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1075:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "Polygons_%d", section_id); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1084:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "Tetrahedra_%d", section_id); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1089:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "Pyramids_%d", section_id); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1094:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "Prisms_%d", section_id); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1099:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "Hexahedra_%d", section_id); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1104:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "Null_section_%d", section_id); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1718:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const coord_name[3] = {"CoordinateX", data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1878:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const coord_name[3] = {"CoordinateX", data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1973:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section_name[FVM_CGNS_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:2177:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section_name[FVM_CGNS_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:2425:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section_name[FVM_CGNS_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:2576:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section_name[FVM_CGNS_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:2891:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section_name[FVM_CGNS_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:3812:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char base_name[FVM_CGNS_NAME_SIZE+1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:3960:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section_name[FVM_CGNS_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4097:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char base_name[FVM_CGNS_NAME_SIZE+1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4098:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char field_name[FVM_CGNS_NAME_SIZE+1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:134:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *_ensight_type_name[FVM_N_ELEMENT_TYPES] = {"bar2", data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:172:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f.tf = fopen(filename, "a"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:174:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f.tf = fopen(filename, "w"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:246:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[82]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:301:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[81] = ""; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:3088:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[81] = ""; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:278:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[1024], description[50]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:340:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(line, "constant per case file: "); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:343:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(line, "scalar per "); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:346:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(line, "vector per "); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:349:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(line, "tensor symm per "); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:352:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(line, "tensor asym per "); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:359:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(line, "node: "); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:362:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(line, "element: "); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:365:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(line, "measured node: "); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:373:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(line + l, "%d ", var->time_set + 1); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:375:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(line, " "); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:430:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(var->file_name + strlen(var->file_name), data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:447:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(var->case_line + strlen(var->case_line) -5, "*****"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:514:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extension[16] = ".geo"; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:520:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(extension, ".geo.%05d", geom_index); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:537:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(this_case->geom_file_name + strlen(this_case->geom_file_name) - 5, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:612:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(this_case->case_file_name, ".case"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:896:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _lw_name[128], _clw_name[128]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:984:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(var->file_name + strlen(var->file_name) - 5, "%05d", var_index); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:1035:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(this_case->case_file_name, "w"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:1111:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[64]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:162:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). w->f = fopen(w->file_name, "w"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:230:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). w->f = fopen(w->file_name, "w"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:462:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpn[128], tmpe[6]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:483:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t_stamp[141]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:634:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(n_sub_opt) > 0) { data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:635:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). w->n_sub = atoi(n_sub_opt); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:95:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MED_NAME_SIZE + 1]; /* Med_Mesh name */ data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:109:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MED_NAME_SIZE + 1]; /* MED field name */ data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:110:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char basename[MED_NAME_SIZE + 1]; /* MED field base name */ data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:190:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _med_version_string_[2][32] = {"", ""}; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:191:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _hdf5_version_string_[2][32] = {"", ""}; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:411:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char med_info[MED_COMMENT_SIZE + 1] = "Generated by Code_Saturne."; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:412:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char family_name[MED_NAME_SIZE + 1] = ""; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:414:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dtunit[MED_LNAME_SIZE + 1] = "s"; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:415:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char axisname[MED_SNAME_SIZE*3 + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:416:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char axisunit[MED_SNAME_SIZE*3 + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1169:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dt_unit[MED_LNAME_SIZE + 1] = "s"; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1221:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(writer->fields[n_fields]->basename, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1231:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(writer->fields[n_fields]->name, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1262:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(&component_name[0], "Scalar"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1265:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const xyz[3] = {"X", "Y", "Z"}; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1272:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const ij_sym[6] = {"11", "22", "33", "12", "13", "23"}; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1279:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const ij_asym[9] = {"11", "12", "13", data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1334:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(med_fieldname, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4288:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(writer->filename, ".med"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4494:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char med_mesh_name[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4539:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char med_mesh_name[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4770:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char med_mesh_name[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4771:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char med_fieldname[MED_NAME_SIZE + 1]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx:597:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(block_coords, vertex_coords, 3*mesh->n_vertices*sizeof(double)); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:172:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpn[128], tmpe[6]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:312:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char options_c[32]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:315:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). rank_step = atoi(options_c); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:401:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tracefile_path, ".log"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:403:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). w->tracefile = fopen(tracefile_path, "w"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:189:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t_stamp[32]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:193:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(t_stamp, "_%.4i", w->nt); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:203:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). w->f = fopen(w->file_name, "w"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:240:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_buf[64]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:175:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t_stamp[32]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:177:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(t_stamp, "_%.4i", w->nt); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:190:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _f = fopen(file_name, "w"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:324:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpn[128], tmpe[6]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_vtk_histogram.cxx:153:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[128]; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_vtk_histogram.cxx:155:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%.4e",var_min + (i+0.5)*var_step); data/code-saturne-6.2.0+repack/src/fvm/fvm_trace.h:45:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. {char str[256]; sprintf(str, "%s:%d", __FILE__, __LINE__); \ data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:810:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_name[32], closest_name[32]; data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:831:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(closest_name, "EnSight Gold"); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:833:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(closest_name, "MEDCoupling"); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:835:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(closest_name, "MED"); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:837:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(closest_name, "CGNS"); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:839:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(closest_name, "Catalyst"); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:841:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(closest_name, "CCM-IO"); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:843:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(closest_name, "Melissa"); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:156:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char swap_buf[72]; data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:1498:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_g_num, g_num, n_vertices*sizeof(cs_gnum_t)); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_priv.h:138:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; /* Format name */ data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_priv.h:139:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[16]; /* Format version (if defined) */ data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:188:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(path0, "numerical_parameters/"); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:799:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char z_id_str[32]; data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:1026:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). z_t_id = atoi(id_s); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:1171:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int z_t_id = atoi(id_s); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:1200:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). z_ids[id] = atoi(id_s); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:1491:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vars->model, "thermal_scalar"); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:2431:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char z_id_str[32]; data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:2517:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char z_id_str[32]; data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:2585:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char z_id_str[32]; data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3091:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tmp, "_diffusivity"); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3251:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char z_id_str[32]; data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3402:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(kdname, "_kd"); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3657:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char z_id_str[32]; data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3867:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *op_name[2] = {"read_method", "write_method"}; data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3991:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int np = atoi(p); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:4408:47: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int verbosity = (verbosity_s != NULL) ? atoi(verbosity_s) : 0; data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:4409:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int visualization = (visu_s != NULL) ? atoi(visu_s) : 0; data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:4662:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int z_t_id = atoi(id_s); data/code-saturne-6.2.0+repack/src/gui/cs_gui_boundary_conditions.c:548:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[32]; data/code-saturne-6.2.0+repack/src/gui/cs_gui_mobile_mesh.c:381:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *name, data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:105:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _rij_c_names[6][4] = {"r11", "r22", "r33", "r12", "r23", "r13"}; data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:388:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[128]; data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:515:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format_options[64]; data/code-saturne-6.2.0+repack/src/gui/cs_gui_particles.c:308:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs_glob_lagr_time_scheme->t_order = atoi(choice); data/code-saturne-6.2.0+repack/src/gui/cs_gui_particles.c:329:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs_glob_lagr_model->idirla = atoi(choice); data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c:364:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *b_rad_names[8] = { data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:421:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *species_key, data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1478:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char crit[128] = ""; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.c:2376:15: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(deleted_buffer + p_set->p_am->extents * count_del, data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.c:2382:15: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(swap_buffer + p_set->p_am->extents * count_swap, data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.c:2389:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p_set->p_buffer + p_set->p_am->extents * start_part, data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.c:2391:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( p_set->p_buffer data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:324:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char z_type_name[32] = "unknown"; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1140:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char z_type_name[32] = "unknown"; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1181:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char z_type_name[32] = "unknown"; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:102:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef char cs_char_64_t[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:504:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char car8[9], kar8[9]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:506:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(car8, "k-eps"); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:508:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(car8, "Rij-eps"); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:510:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(car8, "v2f"); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:512:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(car8, "k-omega"); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:514:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(kar8, "k-eps"); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:516:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(kar8, "Rij-eps"); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:518:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(kar8, "v2f"); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:520:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(kar8, "k-omega"); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:578:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsli], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:582:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itske], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:588:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsmas], "terme_source_masse"); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:595:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itste], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:597:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsti], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:603:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itste], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:605:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsti], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:610:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsmv1[icha]], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:612:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsmv2[icha]], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:617:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsco], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:619:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsfp4], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1089:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef char cs_char_64_t[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1317:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rubriq[32]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1367:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsli], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1370:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itske], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1375:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsmas], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1381:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itste], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1383:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsti], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1387:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itste], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1389:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsti], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1392:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsmv1[icha]], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1394:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsmv2[icha]], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1397:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsco], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1399:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nomtsl[cs_glob_lagr_source_terms->itsfp4], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_log.c:93:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *_astat[2] = {N_("off"), N_("on")}; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1000:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(particles->p_buffer + particles->p_am->extents*(dest), data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1087:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char attr_name[128]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1261:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p_buf + p_am->displ[1][attr], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_post.c:183:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_post.c:185:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name_component[96]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_print.c:110:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). flal = fopen("lagrangian.log","w"); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:115:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:135:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:141:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(sec_name, "random_value"); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:258:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char attr_name[128] = ""; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:430:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128], old_name[128]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:711:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_name[128]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:348:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. _class_name(const char *name, data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:350:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char class_name[64]) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:352:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _class_ext[12]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:377:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char group_name[64]) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:786:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _name[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1117:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1119:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _class_name[12]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1166:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1170:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _class_name[12]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1171:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _comp_name[12]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1173:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *type_name[2] = {"mean", "var"}; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1213:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. _moment_name(const char *base_name, data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1217:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1221:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _class_name[12]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1222:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _comp_name[12]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1224:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *type_name[2] = {"mean", "var"}; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1525:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _r_name[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1943:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:2132:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3282:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _name[96]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3419:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char m_name[128]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3454:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3487:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3502:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char b_stat_name[3][64]; /* mapped to function inputs */ data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3914:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _name[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:4414:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5088:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char group_name[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5230:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[5][64] = {"", "", "", "", ""}; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5540:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:2461:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(particles->p_buffer + tot_extents*(recv_shift + i), data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:2758:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lag_halo->send_buf + extents*shift, data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:2778:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(particles->p_buffer + p_am->extents*particle_count, data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:2966:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(swap_buffer + p_am->extents*i, data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:2997:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(particles->p_buffer + p_am->extents*particle_id, data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:109:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbg_file = fopen(filename, "w"); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:141:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbg_file = fopen(filename, "w"); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1254:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m, join_param.perio_matrix, sizeof(double)*12); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1433:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1785:26: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cs_glob_join_log = fopen(this_join->log_name, "w"); data/code-saturne-6.2.0+repack/src/mesh/cs_join_intersect.c:3768:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(filename, "Join%02dDBG_FaceVis%04d.dat", data/code-saturne-6.2.0+repack/src/mesh/cs_join_intersect.c:3770:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbg_file = fopen(filename, "w"); data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1131:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(filename, "Join%02dDBG_InitMergeSet%04d.dat", data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1133:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbg_file = fopen(filename, "w"); data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1844:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(filename, "Join%02dDBG_MergeSet%04d.dat", data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1846:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbg_file = fopen(filename, "w"); data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1993:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(filename, "Join%02dDBG_EquivMerge%04d.dat", data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1995:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbg_file = fopen(filename, "w"); data/code-saturne-6.2.0+repack/src/mesh/cs_join_mesh.c:1963:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_mesh->vertices, data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c:342:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_join_perio_add_translation(const char *sel_criteria, data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c:394:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_join_perio_add_rotation(const char *sel_criteria, data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c:454:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_join_perio_add_mixed(const char *sel_criteria, data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.h:95:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_join_perio_add_translation(const char *sel_criteria, data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.h:120:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_join_perio_add_rotation(const char *sel_criteria, data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.h:145:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cs_join_perio_add_mixed(const char *sel_criteria, data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:708:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbg_file = fopen(fullname, "w"); data/code-saturne-6.2.0+repack/src/mesh/cs_join_update.c:2546:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fullname, "JoinDBG_ErrorOrient%04d.dat", rank_id); data/code-saturne-6.2.0+repack/src/mesh/cs_join_update.c:2548:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbg_file = fopen(fullname, "w"); data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:136:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param.perio_matrix, perio_matrix, sizeof(double)*12); data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2099:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *sel_criteria, data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2156:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logname[80]; data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2158:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rank_add[16] = ""; data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2159:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char perio_add[16] = ""; data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2171:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(perio_add, "_perio"); data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2173:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(rank_add, "_r%04d", cs_glob_rank_id); data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.h:348:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *sel_criteria, data/code-saturne-6.2.0+repack/src/mesh/cs_mesh.c:1511:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh->global_vtx_num, data/code-saturne-6.2.0+repack/src/mesh/cs_mesh.c:1693:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(count, _count, sizeof(cs_gnum_t)*count_size); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh.c:2333:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(elt_gnum, data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_adjacencies.c:172:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_c2c_idx, c2c_idx, (n_cells+1)*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_adjacencies.c:1221:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(name,"w"); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_boundary_layer.c:136:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*elt_ids, data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coherency.c:304:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(smin, emin, n_cells_with_ghosts*sizeof(cs_real_3_t)); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coherency.c:305:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(smax, emax, n_cells_with_ghosts*sizeof(cs_real_3_t)); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_connect.c:903:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_v2c_idx, _v2c_idx, (n_vertices+1)*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_from_builder.c:458:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh->global_i_face_num, data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_from_builder.c:476:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh->global_b_face_num, data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:155:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_family_idx, *family_idx, (_n_fam+1)*sizeof(int)); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:159:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_family, *family, _family_idx[_n_fam]*sizeof(int)); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:559:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(f_prv, data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:770:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mesh->group, g_lst, size_tot); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:98:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; /* Name */ data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:363:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ml->elt_list, sub_ml->elt_list, ml->n_elts[0]*sizeof(cs_lnum_t)); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1218:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section_name[32]; data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1239:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "periodicity_type_%02d", perio_num); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1244:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "periodicity_matrix_%02d", perio_num); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1273:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section_name[32]; data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1323:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "periodicity_faces_%02d", perio_num); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1372:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section_name[32]; data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1379:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(section_name, "periodicity_faces_%02d", perio_num); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_warping.c:948:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*p_global_face_num, global_num, size); data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2144:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_g_face_cells, mb->face_cells, sizeof(cs_gnum_t)*_n_b_faces*2); data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2162:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(per_face_couples_p, data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2481:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_name[64]; /* more than enough for data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2500:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(file_name, data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:3063:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_part_extra_partitions_list, data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:248:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(path, "rb"); data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:257:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stl_mesh->header, buf, 80); data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:282:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&stl_mesh->normals[3*i+dir], data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:411:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(path,"wb"); data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:420:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, header, 80); data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:436:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&n_temp[dir], data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:449:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&v_temp[dir], data/code-saturne-6.2.0+repack/src/mesh/cs_stl.h:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[10]; /*!< Name identifier of the STL file*/ data/code-saturne-6.2.0+repack/src/mesh/cs_stl.h:56:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[80]; /*!< Header of the STL file */ data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.c:278:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.c:313:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.c:378:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.c:397:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:119:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:125:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[256]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:200:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filepath[256]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:202:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *radfile = fopen(filepath, "r"); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:204:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:469:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filepath[256]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:471:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *radfile = fopen(filepath, "r"); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:473:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:133:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:139:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[256]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:963:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filepath[256]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:977:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). radfile = fopen(filepath, "r"); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:978:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:1007:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). radfile = fopen(filepath, "r"); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:1021:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). radfile = fopen(filepath, "r"); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:1036:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). radfile = fopen(filepath, "r"); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_property_fields.c:144:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char suffix[16]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_property_fields.c:153:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f_name[64], f_label[64]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_restart.c:213:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rubriq[64]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_restart.c:256:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rubriq[64]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_restart.c:259:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char old_name[64]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.c:251:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.c:252:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "radiation_%03d", kdir); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.c:598:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cname[80]; data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.c:1004:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[80]; data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c:277:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csca[5]; data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c:1801:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:1870:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char direction[3] = "xyz"; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-electric_arcs_ieljou_3_or_4.c:110:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[8]; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-electric_arcs_ieljou_3_or_4.c:158:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "%07d", transfo->ielecc[i]); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-electric_arcs_ieljou_3_or_4.c:304:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "%07d", transfo->ielecc[i]); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-nusselt_and_friction_calculation.c:126:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen("Surface_values.dat","w"); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-turbomachinery.c:262:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f1 = fopen("Wr_mean.dat","w"); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-turbomachinery.c:265:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f2 = fopen("Wt_mean.dat","w"); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:321:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). resume = fopen(filename, "w"); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-linear_solvers.c:437:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-linear_solvers.c:438:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "radiation_%03d", i+1); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-time_moments.c:383:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char vel_comp_input[3] = {'r', 't', 'a'}; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-probes-interpolate.c:123:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f_name[128], p_name[128]; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:287:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:458:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var_name[64]; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_radiative_transfer.c:228:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("zray.dat", "r"); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_radiative_transfer.c:234:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("kup.dat", "r"); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_radiative_transfer.c:240:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("kdown.dat", "r"); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-richards.c:98:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f_name[64]; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_zones.c:172:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[128], criteria[128]; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_zones.c:189:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[128], criteria[128]; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_zones.c:209:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[128], criteria[128]; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_zones.c:211:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* file = fopen("turbines", "rt"); data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[64]; data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:65:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (filename, "cs_all_to_all_test_out.%d", rank); data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:66:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "w"); data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:106:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mem_trace_name[32]; data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:132:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mem_trace_name, "cs_all_to_all_test_mem.%d", rank); data/code-saturne-6.2.0+repack/tests/cs_blas_test.c:1951:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(y, x, n*sizeof(cs_real_t)); data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:1416:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cvv[3] = {"xc", "xv1", "xv2"}, *cdof[2] = {"unit", "px"}; data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:1417:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *c_tags[10] = data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:1419:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *g_tags[60] = {"0:x", "0:y", "0:z", data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:1531:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *fv[2] = {"xf", "xv"}; data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:1532:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *f_tags[6] = {"0", "x", "y", "xx", "xy", "yy"}; data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2132:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). hexa = fopen("CDO_tests_Hexa.log", "w"); data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2133:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tetra = fopen("CDO_tests_Tetra.log", "w"); data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2134:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). hexa_hho0 = fopen("HHO0_Hexa_tests.log", "w"); data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2135:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). hexa_hho1 = fopen("HHO1_Hexa_tests.log", "w"); data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2136:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). hexa_hho2 = fopen("HHO2_Hexa_tests.log", "w"); data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2137:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tetra_hho0 = fopen("HHO0_Tetra_tests.log", "w"); data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2138:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tetra_hho1 = fopen("HHO1_Tetra_tests.log", "w"); data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2139:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tetra_hho2 = fopen("HHO2_Tetra_tests.log", "w"); data/code-saturne-6.2.0+repack/tests/cs_check_quadrature.c:1915:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). quadrature = fopen("Quadrature_tests.log", "w"); data/code-saturne-6.2.0+repack/tests/cs_check_sdm.c:304:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). sdm = fopen("SDM_tests.log", "w"); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[80]; data/code-saturne-6.2.0+repack/tests/cs_file_test.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char footer[80]; data/code-saturne-6.2.0+repack/tests/cs_file_test.c:57:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(header, "fvm test file"); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:61:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(footer, "fvm test file end"); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:103:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mem_trace_name[32]; data/code-saturne-6.2.0+repack/tests/cs_file_test.c:104:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char output_file_name[32]; data/code-saturne-6.2.0+repack/tests/cs_file_test.c:105:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/code-saturne-6.2.0+repack/tests/cs_file_test.c:170:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mem_trace_name, "cs_file_test_mem.%d", rank); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:172:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(mem_trace_name, "cs_file_test_mem"); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:191:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(output_file_name, "output_data_%d_%d", a_id+1, p_id+1); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:200:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(output_file_name, "output_data_%d", a_id+1); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:342:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "fvm test file"); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:369:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "fvm test file end"); data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:234:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[64]; data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:240:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (filename, "cs_interface_test_o_out.%d", rank); data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:241:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "w"); data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:257:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[64]; data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:263:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (filename, "cs_interface_test_u_out.%d", rank); data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:264:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "w"); data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:299:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mem_trace_name[32]; data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:325:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mem_trace_name, "cs_interface_test_mem.%d", rank); data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:327:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(mem_trace_name, "cs_interface_test_mem"); data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c:549:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mem_log_file_name[128]; data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:61:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[64]; data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:67:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (filename, "cs_rank_neighbors_test_out.%d", rank); data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:68:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "w"); data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:355:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mem_trace_name[32]; data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:384:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mem_trace_name, "cs_rank_neighbors_test_mem.%d", rank); data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:386:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(mem_trace_name, "cs_rank_neighbors_test_mem"); data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:115:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (send(sock, string, strlen(string)+1, 0) > 0) { data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:122:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(chaine) < 8) { data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:166:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(chaine) < 8 && strncmp(chaine, " -1", 6) == 0) { data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1162:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy((char *)(nop0 + 1), "Genere par mod_nopo", 80); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1163:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (ind = strlen((char *)(nop0 + 1)) ; ind < 80 ; ind++) data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1176:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(((char *)(nop0 + 1 +20)), bufdh, 2); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1178:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(((char *)(nop0 + 1 +20)) + 2, bufdh, 2); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1180:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(((char *)(nop0 + 1 +20)) + 4, bufdh, 4); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1183:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(((char *)(nop0 + 1 +20)), "00000000", 8); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1193:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(str_user, "") ; data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1195:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy((char *)(nop0 + 1 +22), str_user, 24); data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1196:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (ind = strlen(str_user) ; ind < 24 ; ind++) data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:332:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(group_name); data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:536:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_rank_info[3] = strlen(app_type) + 1; data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:538:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_rank_info[4] = strlen(app_name) + 1; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:149:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(s) - 1; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:170:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_sys_info_cpu_string, sys_config.machine, 80); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:173:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(_sys_info_cpu_string, ""); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:177:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(_sys_info_cpu_string, ""); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:310:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ltot += strlen(argv[iarg]) + 1; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:314:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ltot = strlen(argv[iarg]) + 1; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:340:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(opt); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:590:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng = strlen("preprocess") + 1; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:658:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(str_date, ""); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:665:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str_system, " "); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:684:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str_user, pwd_user->pw_name, ECS_STR_SIZE - 1); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:688:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_user = strlen(str_user); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:696:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str_user + l_user + 2, pwd_user->pw_gecos, l_info); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:733:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(str_date) > 0) { data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:739:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(str_system) > 0) { data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:745:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(str_machine) > 0) { data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:761:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(str_user) > 0) { data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:767:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(str_directory) > 0) { data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:922:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng = strlen(argv[++iarg]) + 1; data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:973:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(outfic_err, strlen(outfic) + strlen(".err") + 1, char); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:973:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(outfic_err, strlen(outfic) + strlen(".err") + 1, char); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1009:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(cmd->nom_out, strlen(outfic) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1113:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(cmd->fic_maillage, strlen(argv[iarg]) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1138:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("mesh_input.csm") + 1, data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr.c:98:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(descr_loc->nom, strlen(nom) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille.c:261:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)strlen(_("Family")) + 1); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:183:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(noms_groupes->val[ind], strlen(tab_nom_cpct.val[ind]) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:207:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng_var_nbr = strlen(_("Number of cells")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:208:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng_var_nbr = ECS_MAX(lng_var_nbr, strlen(_("Number of internal faces"))); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:209:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng_var_nbr = ECS_MAX(lng_var_nbr, strlen(_("Number of boundary faces"))); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:210:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng_var_nbr = ECS_MAX(lng_var_nbr, strlen(_("Number of isolated faces"))); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:432:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). printf(" %*s%s\n", (int)(strlen(_("Family")) + 1), "", data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:434:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). printf(" %*s%s\n", (int)(strlen(_("Family")) + 1), "", data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:727:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). = pos_nom_grp[ind_grp] + strlen(tab_noms_groupes.val[ind_grp]) + 1; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:208:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). = (ecs_int_t)strlen(_("Color")) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:209:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + (ecs_int_t)strlen(str_num_coul) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:297:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). max_lng_str_fam = (ecs_int_t)( strlen(_("Family")) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:298:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(str_num_fam) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:615:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). max_lng_var_nbr = ECS_MAX((int)strlen(_("Number of vertices")), data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:616:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)strlen(_("Number of faces")) ); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:618:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)strlen(_("Number of cells")) ); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post.c:84:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(cas->nom_cas, strlen(nom_cas) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:114:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(cas_cgns->nom_cas, strlen(nom_cas) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:242:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng_nom_maillage = strlen(nom_maillage); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:246:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(nom_maillage_cgns, nom_maillage, ECS_CGNS_TAILLE_NOM); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:269:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng_nom_fic = strlen(cas_cgns->nom_cas) + 1 data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:270:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + lng_nom_maillage + strlen(".cgns") + 1; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:89:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cas_ens->nom_cas) + 1 + strlen(".ensight") + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:89:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cas_ens->nom_cas) + 1 + strlen(".ensight") + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:94:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (ind = 0; ind < strlen(cas_ens->nom_cas); ind++) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:109:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(nom_base) + strlen("/") + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:109:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(nom_base) + strlen("/") + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:113:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(cas_ens->prefixe_rep, "/"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:117:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(cas_ens->prefixe_fic, strlen("mesh") + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:124:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cas_ens->prefixe_rep) + strlen(cas_ens->prefixe_fic) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:124:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cas_ens->prefixe_rep) + strlen(cas_ens->prefixe_fic) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:125:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(".case") + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:130:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (ind = strlen(cas_ens->prefixe_rep); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:144:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(cas_ens->prefixe_rep, ""); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:149:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(nom_base) + strlen("_") + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:149:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(nom_base) + strlen("_") + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:153:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(cas_ens->prefixe_fic, "_"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:158:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(nom_base) + strlen(".case") + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:158:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(nom_base) + strlen(".case") + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:165:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(cas_ens->nom_fic_case, "_"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:266:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(cas_ens->nom_cas, strlen(nom_cas) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:334:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ligne, chaine, 80); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:336:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (ind = strlen(chaine); ind < 80; ind++) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:384:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cas_ens->prefixe_rep) + strlen(cas_ens->prefixe_fic) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:384:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cas_ens->prefixe_rep) + strlen(cas_ens->prefixe_fic) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:385:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(".geo") + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:409:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(nom_cas, strlen(cas_ens->prefixe_rep) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:417:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ligne_cas + strlen(ligne_cas), nom_cas, 80 - strlen(ligne_cas)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:417:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(ligne_cas + strlen(ligne_cas), nom_cas, 80 - strlen(ligne_cas)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:417:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(ligne_cas + strlen(ligne_cas), nom_cas, 80 - strlen(ligne_cas)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:98:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(cas_med->nom_cas, strlen(nom_cas) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:101:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng_nom_fic = strlen(nom_cas) + strlen(".med") + 1; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:101:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng_nom_fic = strlen(nom_cas) + strlen(".med") + 1; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:107:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (ind = 0; ind < (ecs_int_t)strlen(nom_cas); ind++) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:244:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng_nom_maillage = strlen(nom_maillage); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:248:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(maillage_med->nom_maillage_med, nom_maillage, MED_NAME_SIZE); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:284:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:284:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:284:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:321:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(pkglibdir) + 1 + 3 + strlen(dl_name) + 3 + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:321:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(pkglibdir) + 1 + 3 + strlen(dl_name) + 3 + 1, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:399:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extension_lng = (extension_fic != NULL) ? strlen(extension_fic) : 0; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:416:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extension_lng = strlen(extension_fic) - 3; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:444:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t mot_cle_lng = strlen(mot_cle); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:241:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(base->nom_fic, strlen(nom_fichier) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:360:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_dec = strlen(nom_rub); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:361:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ind_fin = strlen(text); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:947:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(nom_boco_loc[ind_nom], strlen(nom_tmp) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:165:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("Fortran Binary")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:197:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strncmp(chaine, "C Binary", strlen("C Binary")) != 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:231:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (ind = strlen(ligne) - 1; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:275:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (ind = strlen(ligne) - 1; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:628:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "coordinates", strlen("coordinates")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:721:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "coordinates", strlen("coordinates")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:794:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "g_", strlen("g_")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:801:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strncmp(chaine, "bar", strlen("bar")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:803:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *nbr_som_elt = atoi(chaine+strlen("bar")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:805:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strncmp(chaine, "tria", strlen("tria")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:807:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *nbr_som_elt = atoi(chaine+strlen("tria")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:809:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strncmp(chaine, "quad", strlen("quad")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:811:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *nbr_som_elt = atoi(chaine+strlen("quad")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:813:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strncmp(chaine, "tetra", strlen("tetra")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:815:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *nbr_som_elt = atoi(chaine+strlen("tetra")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:817:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strncmp(chaine, "pyramid", strlen("pyramid")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:819:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *nbr_som_elt = atoi(chaine+strlen("pyramid")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:821:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strncmp(chaine, "penta", strlen("penta")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:823:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *nbr_som_elt = atoi(chaine+strlen("penta")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:825:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strncmp(chaine, "hexa", strlen("hexa")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:827:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *nbr_som_elt = atoi(chaine+strlen("hexa")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:829:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strncmp(chaine, "nsided", strlen("nsided")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:833:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strncmp(chaine, "nfaced", strlen("nfaced")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:919:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "part", strlen("part")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1094:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "part", strlen("part")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1762:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "coordinates", strlen("coordinates")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1811:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "part", strlen("part")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1921:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "node id", strlen("node id")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1932:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( (strncmp(chaine_aux, "given", strlen("given")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1933:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || (strncmp(chaine_aux, "ignore", strlen("ignore")) == 0)) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1944:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "element id", strlen("element id")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1955:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( (strncmp(chaine_aux, "given", strlen("given")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1956:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || (strncmp(chaine_aux, "ignore", strlen("ignore")) == 0)) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1965:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ret != NULL && strncmp(chaine, "extents", strlen("extents")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1978:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (ret != NULL && strncmp(chaine, "part", strlen("part")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2231:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "node id", strlen("node id")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2242:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( (strncmp(chaine_aux, "given", strlen("given")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2243:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || (strncmp(chaine_aux, "ignore", strlen("ignore")) == 0)) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2255:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "element id", strlen("element id")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2266:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( (strncmp(chaine_aux, "given", strlen("given")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2267:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || (strncmp(chaine_aux, "ignore", strlen("ignore")) == 0)) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2298:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (ret != NULL && strncmp(chaine, "part", strlen("part")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2314:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). num_part_lu = atoi(chaine+strlen("part")); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2468:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } while (ret != NULL && strncmp(ligne, "FORMAT", strlen("FORMAT")) != 0); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2475:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } while (ret != NULL && strncmp(ligne, "type:", strlen("type:")) != 0); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2481:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (ind = strlen("type:"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2485:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(ligne + ind, "ensight", strlen("ensight")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2489:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ind += strlen("ensight"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2493:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(ligne + ind, "gold", strlen("gold")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2512:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } while (ret != NULL && strncmp(ligne, "GEOMETRY", strlen("GEOMETRY")) != 0); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2519:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } while (ret != NULL && strncmp(ligne, "model:", strlen("model:")) != 0); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2561:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (ind = strlen(nom_fic_case) - 1; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2568:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(nom_fic_geo, ind + strlen(nom_fic_geo_base) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2569:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(nom_fic_geo, nom_fic_case, ind); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:860:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(*nom_grp, strlen(chaine + ind) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1100:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(*nom_cl, strlen(ch_nom_cl) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:388:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "$EndMeshFormat", strlen("$EndMeshFormat")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:501:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( (strncmp(chaine, "$EndNodes", strlen("$EndNodes")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:502:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && (strncmp(chaine, "$ENDNOD", strlen("$ENDNOD")) != 0)) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:583:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t s_id = 0, e_id = strlen(name); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:604:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(line, "$EndPhysicalNames", strlen("$EndPhysicalNames")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:867:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(line, "$EndEntities", strlen("$EndEntities")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1120:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( (strncmp(chaine, "$EndNodes", strlen("$EndNodes")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1121:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && (strncmp(chaine, "$ENDNOD", strlen("$ENDNOD")) != 0)) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1579:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( (strncmp(chaine, "$EndElements", strlen("$EndElements")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1580:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && (strncmp(chaine, "$ENDELM", strlen("$ENDELM")) != 0)) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2036:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( (strncmp(chaine, "$EndElements", strlen("$EndElements")) != 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2037:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && (strncmp(chaine, "$ENDELM", strlen("$ENDELM")) != 0)) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2155:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(chaine, "$MeshFormat", strlen("$MeshFormat")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2164:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("$PhysicalNames")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2174:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("$Entities")) == 0) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2194:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("$ParametricNodes")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2204:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if ( (strncmp(chaine, "$Nodes", strlen("$Nodes")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2205:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || (strncmp(chaine, "$NOD", strlen("$NOD")) == 0)) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2227:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if ( (strncmp(chaine, "$Elements", strlen("$Elements")) == 0) data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2228:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || (strncmp(chaine, "$ELM", strlen("$ELM")) == 0)) { data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1626:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(ideas_grp_name, "\0"); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1630:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(ideas_grp_name, " "); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:110:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(fic->nom_fic, strlen(nom_fichier) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:599:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nom_equiv_cmp[strlen(nom_equiv)] = '\0'; data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1361:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(un_att_des_med, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1412:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(un_grp_des_med, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1637:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(nom_maillage, strlen(nom_maillage_med) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:186:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(this_part->nom_part, strlen(nom_maillage) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:281:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(ecs_fic_elt_typ_liste_c[elt_typ_ref].nom) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:247:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(nom_fam_med, prefixe_nom_fam, MED_NAME_SIZE - 3); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:248:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(nom_fam_med, str_num_fam_med, data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:249:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). MED_NAME_SIZE - strlen(prefixe_nom_fam)); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:357:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen("FAMILLE_") + strlen(str_num_fam_med) <= MED_NAME_SIZE); data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:357:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen("FAMILLE_") + strlen(str_num_fam_med) <= MED_NAME_SIZE); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:187:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bt->s_addr[i] = malloc((strlen(s_addr)+1) * sizeof(char)); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:206:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bt->s_func[i] = malloc((strlen(s_func)+1) * sizeof(char)); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:226:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bt->s_file[i] = malloc((strlen(s_file)+1) * sizeof(char)); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:401:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s_func_buf, "?"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:404:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s_func_buf + 1, s_func, 64); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:405:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s_func_buf, ">"); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:198:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(header, "Code_Saturne I/O, BE, R0", 63); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:213:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(header, "Face-based mesh definition, R0", 63); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:232:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) < 32) { data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:234:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_pad[32 - strlen(name)] = '\0'; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:236:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(datatype_name) < 2) { data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:238:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). type_pad[2 - strlen(datatype_name)] = '\0'; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:266:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(comm->name, strlen(file_name) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:391:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_size = strlen(name); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c:185:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strcmp(lang + strlen(lang) - 5, "UTF-8") == 0 data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c:186:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strcmp(lang + strlen(lang) - 4, "utf8") == 0) data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c:193:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lng = strlen(chaine); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:127:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int)strlen(nom) < ECS_LOC_IMP_INDENT) data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:360:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int i = strlen(s) - 2; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:591:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ECS_MALLOC(f->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:709:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(f->name) > 3 && data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:710:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (! strncmp((f->name + strlen(f->name) - 3), ".gz", 3))) { data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:737:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(f->name) > 3 && data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:738:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (! strncmp((f->name + strlen(f->name) - 3), ".gz", 3))) { data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem.c:159:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(file_name) - 1; data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:164:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r_size = read(fd, buf, 512); data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:239:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(v->vector_multiply_name[mft][0], vector_multiply, 63); data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:241:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(v->vector_multiply_name[mft][1], vector_multiply, 63); data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:250:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(v->vector_multiply_name[mft][0], b_vector_multiply, 63); data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:252:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(v->vector_multiply_name[mft][1], b_vector_multiply, 63); data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:259:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(v->vector_multiply_name[mft][0], bb_vector_multiply, 63); data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:261:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(v->vector_multiply_name[mft][1], bb_vector_multiply, 63); data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:629:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(v->vector_multiply_name[f_id][0]) < 1 data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:630:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(v->vector_multiply_name[f_id][1]) < 1) data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:655:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(v->vector_multiply_name[f_id][ed_flag]) > 0) data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:839:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(v->vector_multiply_name[f_id][0]) < 1 data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:840:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(v->vector_multiply_name[f_id][1]) < 1) data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:884:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(v->vector_multiply_name[f_id][ed_flag]) > 0) data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1022:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(title); data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1026:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(title + i, "matrix structure creation/destruction", l); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:1779:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[scalar convection-diffusion]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:3208:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[scalar face flux from convection]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:4259:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[convection-diffusion, vector]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:5981:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[convection-diffusion, tensor]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:6983:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[convection-diffusion, thermal]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:8283:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[anisotropic diffusion, scalar]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:9033:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[anisotropic left diffusion, vector]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:9584:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[anisotropic right diffusion, vector]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:10284:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[anisotropic diffusion, tensor]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:10893:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[face mass flux update]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:11260:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[face mass flux update]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:11737:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[cell mass flux divergence update]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:12137:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[cell mass flux divergence update]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_divergence.c:476:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[momentum]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_divergence.c:1012:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "[tensor face flux]", 63); data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:424:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(new_info->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:2163:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)(strlen(__func__)), " ", l2_residual/rnorm, rnorm); data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:2175:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)(strlen(__func__)), " ", l2_residual/rnorm, rnorm); data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:5692:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)(strlen(__func__)), " ", l2_residual/l2_norm, l2_norm); data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:5965:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)(strlen(__func__)), " ", l2_residual/l2_norm, l2_norm); data/code-saturne-6.2.0+repack/src/alge/cs_gradient_perio.c:353:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(f->name) == 3) { data/code-saturne-6.2.0+repack/src/alge/cs_gradient_perio.c:566:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(f->name) == 3) { data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:4338:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(v->name[j], name, 31); data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:7079:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(mv->name[j], "default", 31); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:997:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_REALLOC(mg->post_name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1072:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = 3 + strlen(base_name) + 1 + 3 + 1 + 4 + 1; data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1199:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_REALLOC(mgd->pc_name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1237:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_REALLOC(mgd->pc_name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1262:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_REALLOC(mgd->pc_name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1721:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(name) + 32; data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1867:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(name) + 32; data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2769:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf_size = (strlen(name) + strlen(":descent:") + w + 1) data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2769:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf_size = (strlen(name) + strlen(":descent:") + w + 1) data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2804:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t name_len = strlen(name) + strlen(":descent:") + w + 1; data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2804:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t name_len = strlen(name) + strlen(":descent:") + w + 1; data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:397:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sles->_name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:854:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) + strlen(base_name) < 31) { data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:854:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) + strlen(base_name) < 31) { data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:856:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(val_name, "_"); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:860:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(val_name, base_name, 31); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1223:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(retval->_name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1916:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(base_name, "X"); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1937:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) + strlen(base_name) < 31) { data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1937:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) + strlen(base_name) < 31) { data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1939:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(val_name, "_"); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1943:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(val_name, base_name, 31); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:2041:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = 31 - strlen("_fp_type"); data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:2043:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(type_name, name, l); data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c:789:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sym_type_name, "unsymmetric", 31); data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c:792:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sym_type_name, "spd", 31); data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c:795:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sym_type_name, "symmetric", 31); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:217:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(name) + strlen("_matrix.dat") + 1; data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:217:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(name) + strlen("_matrix.dat") + 1; data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1576:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(norm_type_name, "none", 31); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1579:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(norm_type_name, "preconditioned", 31); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1582:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(norm_type_name, "unpreconditioned", 31); data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1585:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(norm_type_name, "natural", 31); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:785:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = start + strlen(start); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:787:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (end != start + strlen(start)) data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:809:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = start + strlen(start); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:811:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (end != start + strlen(start)) data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:917:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *end = argv[i] + strlen(argv[i]); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1111:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(format, f_fmt, 48); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1112:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(format, "\n"); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1130:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(format, f_fmt, 48); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1131:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(format, "\n"); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1564:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(format, f_fmt, 48); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1565:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(format, "\n"); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1579:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(format, f_fmt, 48); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1580:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(format, "\n"); data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1681:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_names_size = idx->names_size + strlen(inp->name) + 1; data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1682:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_types_size = idx->types_size + strlen(inp->type_name) + 1; data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2256:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(fmt, "\n"); data/code-saturne-6.2.0+repack/src/atmo/cs_at_data_assim.c:159:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t fn_size = strlen(f->name); data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:538:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) == 0) data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:623:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(file_name) + 1, data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:648:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(file_name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_base.c:649:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s_func_buf, "?"); data/code-saturne-6.2.0+repack/src/base/cs_base.c:652:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s_func_buf + 1, s_func, 64); data/code-saturne-6.2.0+repack/src/base/cs_base.c:653:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s_func_buf, ">"); data/code-saturne-6.2.0+repack/src/base/cs_base.c:794:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1, data/code-saturne-6.2.0+repack/src/base/cs_base.c:794:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1, data/code-saturne-6.2.0+repack/src/base/cs_base.c:794:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1, data/code-saturne-6.2.0+repack/src/base/cs_base.c:1071:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(app_name, strlen(argv[arg_id + 1]) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1096:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(buf) - 1; i > 0 && buf[i-1] != '/'; i--); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1097:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(app_name, strlen(buf + i) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1242:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(CS_REVISION) > 0) data/code-saturne-6.2.0+repack/src/base/cs_base.c:1607:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). file_name = malloc((strlen(base_name) + n_dec + 2) * sizeof (char)); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1611:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). file_name = malloc((strlen(base_name) + 1) * sizeof (char)); data/code-saturne-6.2.0+repack/src/base/cs_base.c:1985:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(log_name) + strlen(ext) + 1, data/code-saturne-6.2.0+repack/src/base/cs_base.c:1985:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(log_name) + strlen(ext) + 1, data/code-saturne-6.2.0+repack/src/base/cs_base.c:2002:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(log_name) + n_dec + 3 + strlen(ext), char); data/code-saturne-6.2.0+repack/src/base/cs_base.c:2002:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(log_name) + n_dec + 3 + strlen(ext), char); data/code-saturne-6.2.0+repack/src/base/cs_base.c:2260:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(s); data/code-saturne-6.2.0+repack/src/base/cs_base.c:2378:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(datadir) + strlen(subdir) + strlen(base_name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_base.c:2378:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(datadir) + strlen(subdir) + strlen(base_name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_base.c:2378:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(datadir) + strlen(subdir) + strlen(base_name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_base.c:2458:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(pkglibdir) + 1 + 3 + strlen(name) + 3 + 1, data/code-saturne-6.2.0+repack/src/base/cs_base.c:2458:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(pkglibdir) + 1 + 3 + strlen(name) + 3 + 1, data/code-saturne-6.2.0+repack/src/base/cs_base.c:2610:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s_func_buf, "?"); data/code-saturne-6.2.0+repack/src/base/cs_base.c:2613:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s_func_buf + 1, s_func, 64); data/code-saturne-6.2.0+repack/src/base/cs_base.c:2614:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s_func_buf, ">"); data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:385:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_l = strlen(name); data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:425:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). datadir_l = strlen(datadir); data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:227:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(descr, descr_add, name_len_max-1); data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:229:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(descr); data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:230:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(descr, ", ", name_len_max-l-1); data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:232:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(descr); data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:233:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(descr, descr_add, name_len_max-l-1); data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:658:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(descr, _("undefined"), descr_len_max-1); data/code-saturne-6.2.0+repack/src/base/cs_boundary_zone.c:191:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(name); data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:323:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_var_name, var_name, CS_CALCIUM_VARIABLE_LEN); data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:397:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_var_name, var_name, CS_CALCIUM_VARIABLE_LEN); data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:470:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_var_name, var_name, CS_CALCIUM_VARIABLE_LEN); data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:523:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_var_name, var_name, CS_CALCIUM_VARIABLE_LEN); data/code-saturne-6.2.0+repack/src/base/cs_control.c:309:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ret = read(comm->socket, _rec + start_id, n_loc); data/code-saturne-6.2.0+repack/src/base/cs_control.c:451:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ret = read(comm->socket, queue->buf + start_id, n_loc); data/code-saturne-6.2.0+repack/src/base/cs_control.c:523:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (id = strlen(comm->port_name) - 1; data/code-saturne-6.2.0+repack/src/base/cs_control.c:529:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(host_name, comm->port_name, id); data/code-saturne-6.2.0+repack/src/base/cs_control.c:594:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(magic_string); data/code-saturne-6.2.0+repack/src/base/cs_control.c:599:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _comm_write_sock(comm, key, 1, strlen(key)); data/code-saturne-6.2.0+repack/src/base/cs_control.c:647:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(comm->port_name, strlen(port_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_control.c:1009:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _comm_write_sock(_cs_glob_control_comm, reply, 1, strlen(reply) + 1); data/code-saturne-6.2.0+repack/src/base/cs_control.c:1140:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(cur_line); data/code-saturne-6.2.0+repack/src/base/cs_control.c:1290:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _comm_write_sock(control_comm, reply, 1, strlen(reply) + 1); data/code-saturne-6.2.0+repack/src/base/cs_control.c:1435:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _comm_write_sock(_cs_glob_control_comm, reply, 1, strlen(reply)+1); data/code-saturne-6.2.0+repack/src/base/cs_field.c:399:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(name); data/code-saturne-6.2.0+repack/src/base/cs_field.c:847:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *name_len = strlen(*name); data/code-saturne-6.2.0+repack/src/base/cs_field.c:1408:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *str_len = strlen(*str); data/code-saturne-6.2.0+repack/src/base/cs_field.c:1498:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *str_len = strlen(*str); data/code-saturne-6.2.0+repack/src/base/cs_field.c:2410:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(name); data/code-saturne-6.2.0+repack/src/base/cs_field.c:2458:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(c_str, name0 + l0 + 1, 63); data/code-saturne-6.2.0+repack/src/base/cs_field.c:2639:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(kd->def_val.v_p, strlen(default_value) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_field.c:3263:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_REALLOC(kv->val.v_p, strlen(str) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_field.c:3652:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(f->name); data/code-saturne-6.2.0+repack/src/base/cs_field.c:4130:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(f->name); data/code-saturne-6.2.0+repack/src/base/cs_field_default.c:156:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(label) > 0) data/code-saturne-6.2.0+repack/src/base/cs_field_default.c:205:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(label) > 0) data/code-saturne-6.2.0+repack/src/base/cs_file.c:1841:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(f->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_file.c:3792:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(dirnames[n_ent], strlen(ent->d_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_file.c:3947:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int lpath = strlen(path); data/code-saturne-6.2.0+repack/src/base/cs_file.c:3948:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int lext = strlen(end); data/code-saturne-6.2.0+repack/src/base/cs_flag_check.c:403:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(var_name, flag_label, 31); data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:631:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(cpl->cells_criteria, strlen(criteria_cells)+1, char); data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:635:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(cpl->faces_criteria, strlen(criteria_faces)+1, char); data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:656:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(group_name)+1, data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:2663:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(cpl->namesca, strlen(f->name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_io.c:520:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_names_size = idx->names_size + strlen(inp->sec_name) + 1; data/code-saturne-6.2.0+repack/src/base/cs_io.c:714:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cs_io->contents, header_data + 64, 64); data/code-saturne-6.2.0+repack/src/base/cs_io.c:747:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(header_data + 64, magic_string, 64); data/code-saturne-6.2.0+repack/src/base/cs_io.c:811:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(filename) >= 128) data/code-saturne-6.2.0+repack/src/base/cs_io.c:812:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(tmpname, strlen(filename) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_io.c:1625:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_size = strlen(sec_name); data/code-saturne-6.2.0+repack/src/base/cs_log.c:170:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strcmp(lang + strlen(lang) - 5, "UTF-8") == 0 data/code-saturne-6.2.0+repack/src/base/cs_log.c:171:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strcmp(lang + strlen(lang) - 4, "utf8") == 0) data/code-saturne-6.2.0+repack/src/base/cs_log.c:178:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p_len = strlen(src); data/code-saturne-6.2.0+repack/src/base/cs_log.c:306:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strcmp(lang + strlen(lang) - 5, "UTF-8") == 0 data/code-saturne-6.2.0+repack/src/base/cs_log.c:307:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strcmp(lang + strlen(lang) - 4, "utf8") == 0) data/code-saturne-6.2.0+repack/src/base/cs_log.c:314:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(str); data/code-saturne-6.2.0+repack/src/base/cs_log.c:634:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(header_title) > 0) data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:989:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t name_width = strlen(stat_name); data/code-saturne-6.2.0+repack/src/base/cs_map.c:114:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t key_size = CS_ALIGN_SIZE(strlen(key) + 1); data/code-saturne-6.2.0+repack/src/base/cs_measures_util.c:327:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) == 0) data/code-saturne-6.2.0+repack/src/base/cs_measures_util.c:463:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) == 0) data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:172:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mi->name, strlen(name)+1, char); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:175:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mi->medfile_path, strlen(medfile_path)+1, char); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:178:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mi->interp_method, strlen(interp_method)+1, char); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:315:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(subdir) == 0) data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:324:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lsdir = strlen(subdir); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:325:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lname = strlen(filename); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:329:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lext = strlen(_ext); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:222:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(r->name, strlen(name)+1, char); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:227:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(r->medfile_path, strlen(medfile_path)+1, char); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:232:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(r->field_names[i], strlen(field_names[i])+1, char); data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_utils.cxx:577:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(m->sel_criteria, strlen(selection_criteria)+1, char); data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:157:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(name); data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:253:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(description); data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:256:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(e->description, ""); data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:349:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen(d) == 0) data/code-saturne-6.2.0+repack/src/base/cs_opts.c:218:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(opts->app_name, strlen(argv[arg_id + 1]) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_coupling.cxx:312:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(c->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_coupling.cxx:505:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mesh->sel_criteria, strlen(select_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:320:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(r->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1182:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1222:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1225:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(variable_name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1260:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1470:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen("boundary_") + strlen(f->name) + 1; data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1470:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen("boundary_") + strlen(f->name) + 1; data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:211:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(cs_glob_thermal_table->material, strlen(material) +1, char); data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:216:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(cs_glob_thermal_table->method, strlen(method) +1, char); data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:223:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(cs_glob_thermal_table->method, strlen(method) +1, char); data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:250:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(cs_glob_thermal_table->method, strlen(method) +5, char); data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:293:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(_porosity_from_scan_opt.file_name) + 3 + 1, data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:298:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(_porosity_from_scan_opt.output_name) + 3 + 1, data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:534:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(file_name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:559:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(output_name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_post.c:1493:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mesh_name, strlen(post_mesh->name) + 32, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2551:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(part_name, g_name, 80 - strlen(part_name)); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2551:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(part_name, g_name, 80 - strlen(part_name)); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2634:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(part_name, g_name, 80 - strlen(part_name)); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2634:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(part_name, g_name, 80 - strlen(part_name)); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2885:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name_buf, name, 90); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2889:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(name_buf, cs_glob_field_comp_name_3[comp_id], 5); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2892:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(name_buf, cs_glob_field_comp_name_6[comp_id], 5); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2895:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(name_buf, cs_glob_field_comp_name_9[comp_id], 5); data/code-saturne-6.2.0+repack/src/base/cs_post.c:2898:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). snprintf(name_buf + strlen(name_buf), 5, "[%ld]", (long)comp_id); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3071:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(interpolate_input, f->name, 95); interpolate_input[95] = '\0'; data/code-saturne-6.2.0+repack/src/base/cs_post.c:3174:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(interpolate_input, f->name, 95); interpolate_input[95] = '\0'; data/code-saturne-6.2.0+repack/src/base/cs_post.c:3361:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(interpolate_input, f->name, 95); interpolate_input[95] = '\0'; data/code-saturne-6.2.0+repack/src/base/cs_post.c:3494:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3868:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(wd->case_name, strlen(case_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3871:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(wd->dir_name, strlen(dir_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3877:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(wd->fmt_opts, strlen(fmt_opts) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3893:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(wd->fmt_opts)+ 1, data/code-saturne-6.2.0+repack/src/base/cs_post.c:3938:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:3942:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(post_mesh->criteria[0], strlen(cell_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4003:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4052:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4056:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(post_mesh->criteria[1], strlen(i_face_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4062:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(post_mesh->criteria[2], strlen(b_face_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4133:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4202:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4206:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(post_mesh->criteria[3], strlen(cell_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4270:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_post.c:4459:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(post_base->name) + strlen(_(" edges")) + 1, data/code-saturne-6.2.0+repack/src/base/cs_post.c:4459:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(post_base->name) + strlen(_(" edges")) + 1, data/code-saturne-6.2.0+repack/src/base/cs_post.c:7222:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(part_name, g_name, 80 - strlen(part_name)); data/code-saturne-6.2.0+repack/src/base/cs_post.c:7222:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(part_name, g_name, 80 - strlen(part_name)); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:201:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(input_default_noext) + 1 + strlen(dir_files[i]) + 1, data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:201:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(input_default_noext) + 1 + strlen(dir_files[i]) + 1, data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:465:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_size += strlen(new_src); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:482:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(new_dest, ""); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1765:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("periodicity_type_")) == 0) { data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1771:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). perio_num = atoi(header.sec_name + strlen("periodicity_type_")); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1778:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("periodicity_matrix_")) == 0) { data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1786:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). == atoi(header.sec_name + strlen("periodicity_matrix_"))); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1804:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("periodicity_faces_")) == 0) { data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1807:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen("periodicity_faces_")) - 1 data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1939:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). data_size = _align_size(strlen(file_name) + 1); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1949:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). data_size += _align_size(strlen(group_rename[i*2]) + 1); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1951:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). data_size += _align_size(strlen(group_rename[i*2+1]) + 1); data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1980:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(file_name) + 1; data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2012:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(group_rename[i*2]) + 1; data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2017:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(group_rename[i*2+1]) + 1; data/code-saturne-6.2.0+repack/src/base/cs_probe.c:275:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name) + 1; data/code-saturne-6.2.0+repack/src/base/cs_probe.c:363:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(name) + 1; data/code-saturne-6.2.0+repack/src/base/cs_probe.c:365:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pset->name, name, len); data/code-saturne-6.2.0+repack/src/base/cs_probe.c:421:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int reflen = strlen(ref_name); data/code-saturne-6.2.0+repack/src/base/cs_probe.c:422:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(pset->name); data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1351:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(keyval) + 1; data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1353:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pset->sel_criter, keyval, len); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:306:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(loc->name, strlen(h.sec_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:864:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sec_name_l = strlen(name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:867:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sec_name_l += strlen(prefix); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:869:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sec_name_l += strlen(postfix); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1675:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen(name) == 0) data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1696:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lname = strlen(name) + 1; data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1703:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(_path) == 0) data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1708:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lpath = strlen(_path) + 1; data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1746:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lenf = strlen(fname) + 1; data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2142:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(_path) == 0) data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2167:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ldir = strlen(_path); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2168:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen(name); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2186:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lext = strlen(_extension); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2191:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(_name, name, lname-lext); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2206:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lsdir = strlen(_subdir); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2241:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(restart->name, strlen(_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2462:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(location_name)+1, data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2515:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(location_name)+1, data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3060:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen(name) + strlen(coords_postfix) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3060:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen(name) + strlen(coords_postfix) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3078:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen(name) + strlen(cell_num_postfix) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3078:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen(name) + strlen(cell_num_postfix) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3207:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen(name) + strlen(coords_postfix) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3207:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen(name) + strlen(coords_postfix) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3244:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen(name) + strlen(cell_num_postfix) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3244:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen(name) + strlen(cell_num_postfix) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart.c:4069:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int j = strlen(path)-1; j > -1; j--) { data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:342:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(r_name) > 96) data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:343:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen(r_name) + 64, char); /* wide margin */ data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:465:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "vitesse", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:467:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sec_name, "velocity_prev", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:470:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "pression", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:472:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "R11", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:474:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "R22", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:476:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "R33", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:478:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "R12", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:480:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "R13", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:482:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "R23", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:484:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "Rij", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:486:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "eps", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:488:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "fb", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:494:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "alp", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:498:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "al", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:503:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "al", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:506:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "nusa", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:508:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "vit_maillage", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:511:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "rho", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:513:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "rho_old", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:516:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sec_name, "rho_fb_phase01", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:519:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "cp", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:522:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "viscl", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:524:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "visct", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:527:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "tparoi_fb", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:529:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "qincid_fb", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:531:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "hfconv_fb", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:533:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "flconv_fb", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:536:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sec_name, "dt_variable_espace_ce", 127); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:539:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sec_name, "dt_variable_espace_ce", 127); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:544:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sec_name, "vertex_displacement", 127); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:547:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sec_name, "taux_vide_ce", 127); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:550:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sec_name, "rayexp_ce", 127); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:552:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sec_name, "rayimp_ce", 127); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:554:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sec_name, "luminance", 127); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:557:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sec_name, "tsource_sc_ce_joule", 127); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:559:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(old_name, "laplace_force", 96); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:879:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:879:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:1834:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sizes[1] += strlen(f->name) + 1; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:1849:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(f->name) + 1; data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2246:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2246:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2398:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2398:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2543:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(name) + strlen(_coeff_name[c_id]) + 3, data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2543:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(name) + strlen(_coeff_name[c_id]) + 3, data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2691:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(f->name) + strlen(_coeff_name[c_id]) + 3, data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2691:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(f->name) + strlen(_coeff_name[c_id]) + 3, data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2786:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ref_sec_name, sec_name, 128); data/code-saturne-6.2.0+repack/src/base/cs_restart_map.c:285:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = strlen(mesh_path); data/code-saturne-6.2.0+repack/src/base/cs_restart_map.c:288:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_mesh_input_path, mesh_path, n); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1910:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(scb->app_name, strlen(saturne_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1916:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(scb->face_cpl_sel_c, strlen(boundary_cpl_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1922:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(scb->cell_cpl_sel_c, strlen(volume_cpl_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1928:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(scb->face_loc_sel_c, strlen(boundary_loc_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1934:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(scb->cell_loc_sel_c, strlen(volume_loc_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2044:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sat_coupling->sat_name, strlen(sat_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2056:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sat_coupling->face_cpl_sel, strlen(face_cpl_sel_c) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2060:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sat_coupling->cell_cpl_sel, strlen(cell_cpl_sel_c) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2065:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sat_coupling->face_loc_sel, strlen(face_loc_sel_c) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2069:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(sat_coupling->cell_loc_sel, strlen(cell_loc_sel_c) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.c:265:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen("DistribOutput_l.dat")+1+2; data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:279:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_op_name_send, op_name_send, 32); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:567:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(_("SYRTHES %s cells")) data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:568:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(syr_coupling->syr_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:599:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("SYRTHES faces") + strlen(syr_coupling->syr_name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:599:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("SYRTHES faces") + strlen(syr_coupling->syr_name) + 1, data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1369:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(syr_coupling->syr_name, strlen(syr_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1383:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(syr_coupling->face_sel, strlen(face_sel_criterion) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1387:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(syr_coupling->cell_sel, strlen(cell_sel_criterion) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:342:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_REALLOC(_syr_coupling_builder->app_name, strlen(ai.app_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:516:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(scb->app_name, strlen(syrthes_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:522:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(scb->face_sel_c, strlen(boundary_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:528:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(scb->cell_sel_c, strlen(volume_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:104:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(s); data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:136:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(cpu_str, ""); data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:161:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(s) - 1; data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:177:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cpu_str, sys_config.machine, cpu_str_max); data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:217:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(s); data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:224:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(issue_str); data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:332:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(str_date, ""); data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:338:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(str_directory, ""); data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:702:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). c_size = strlen(desc); data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:1720:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mt->name, strlen(s)+1, char); data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2259:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(f->name); data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2698:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t l = strlen(name) + 1; data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:300:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(file_prefix) + strlen(plot_name) + strlen("_coords") + 4 + 1, data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:300:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(file_prefix) + strlen(plot_name) + strlen("_coords") + 4 + 1, data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:300:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(file_prefix) + strlen(plot_name) + strlen("_coords") + 4 + 1, data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:639:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(p->plot_name, strlen(plot_name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:641:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(file_prefix) + strlen(plot_name) + 4 + 1, data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:641:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(file_prefix) + strlen(plot_name) + 4 + 1, data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:656:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(file_prefix); p->file_name[i] != '\0'; i++) { data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1201:22: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. p->buffer_end += sprintf(p->buffer + p->buffer_end, "\n"); data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1218:22: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. p->buffer_end += sprintf(p->buffer + p->buffer_end, "\n"); data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c:467:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(parent_name) > 0) data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c:518:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l_len = strlen(label); data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c:525:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(s->label, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:104:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(s); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:151:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t path_len = strlen(path); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:169:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, p, level_len); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:172:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_name, p, level_len); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:243:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(_node->name) == level_len) data/code-saturne-6.2.0+repack/src/base/cs_tree.c:379:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:447:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_REALLOC(node->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:676:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_REALLOC(node->value, strlen(val) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1365:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) == 0) data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1391:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) != 0) data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1506:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(sub_path) == 0) data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1539:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(sub_path) == 0) data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1571:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(tn->name) == l) { data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1622:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) == 0) data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1656:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) == 0) data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:1265:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(tbm->rotor_cells_c[r_id], strlen(cell_criteria) + 1, char); data/code-saturne-6.2.0+repack/src/base/cs_volume_zone.c:205:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(name); data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:198:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bt->s_addr[i] = malloc((strlen(s_addr)+1) * sizeof(char)); data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:217:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bt->s_func[i] = malloc((strlen(s_func)+1) * sizeof(char)); data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:237:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bt->s_file[i] = malloc((strlen(s_file)+1) * sizeof(char)); data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:325:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l2 = strlen(bt->s_func[i] + j); data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:335:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(s_cplus_func_p); data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:343:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s_cplus_func, s_cplus_func_p, l + 1); data/code-saturne-6.2.0+repack/src/bft/bft_mem.c:237:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(file_name) - 1; data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:354:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(name) + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:356:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(adv->name, name, len); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:452:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int reflen = strlen(ref_name); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:453:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(adv->name); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:488:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(adv->name) < 200); data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:941:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(adv->name) + strlen("_cells") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:941:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(adv->name) + strlen("_cells") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:966:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(adv->name) + strlen("_vertices") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:966:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(adv->name) + strlen("_vertices") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:990:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(adv->name) + strlen("_boundary_flux") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:990:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(adv->name) + strlen("_boundary_flux") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:1454:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int lname = strlen("DumpConnect.dat") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c:1177:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int lname = strlen("DumpQuantities.dat") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1561:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(_eqp->name, strlen(eqp->name) + strlen(":gkb_transfo") + 1, char); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1561:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(_eqp->name, strlen(eqp->name) + strlen(":gkb_transfo") + 1, char); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2696:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(_eqp->name, strlen(eqp->name)+1, char); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2862:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(_eqp->name, strlen(eqp->name) + strlen(":alu0") + 1, char); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2862:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(_eqp->name, strlen(eqp->name) + strlen(":alu0") + 1, char); data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2940:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(field->name) + 8 + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:2210:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(field->name) + 8 + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_scaleq.c:3355:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eqp->name) + 8 + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c:213:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eqname) + strlen("-sol-.log") + 4 + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c:213:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eqname) + strlen("-sol-.log") + 4 + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:195:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(adv->name) + 8 + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:246:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eqp->name) + 8 + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:296:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(pty->name) + 8 + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:359:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len_in = strlen(eqname); data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:366:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(eqp->name) == len_in) data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:1151:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(varname)+1; data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:1153:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(eq->varname, varname, len); data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:2315:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eq->varname) + strlen("_normal_boundary_flux") + 2; data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:2315:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eq->varname) + strlen("_normal_boundary_flux") + 2; data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:3318:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eqp->name) + 13 + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.c:653:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = 1 + strlen("<CDO/> Monitoring") + strlen(eqname); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.c:653:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = 1 + strlen("<CDO/> Monitoring") + strlen(eqname); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:1823:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(name)+1; data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:1825:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(eqp->name, name, len); data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2302:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (size_t i = 0; i < strlen(keyval); i++) data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2304:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val[strlen(keyval)] = '\0'; data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2479:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(eqname) < 200); /* Check that prefix is large enough */ data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:568:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eq_name) + strlen("_time") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:568:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eq_name) + strlen("_time") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:840:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eq_name) + strlen("_diffusivity") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:840:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eq_name) + strlen("_diffusivity") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:868:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eq_name) + strlen("_reaction") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:868:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eq_name) + strlen("_reaction") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:884:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eq_name) + strlen("_precip") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:884:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(eq_name) + strlen("_precip") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:472:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (size_t i = 0; i < strlen(keyval); i++) data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:474:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val[strlen(keyval)] = '\0'; data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1156:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (z_name != NULL && strlen(z_name) > 0) data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1220:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (z_name != NULL && strlen(z_name) > 0) data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1277:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (z_name != NULL && strlen(z_name) > 0) data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1327:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (z_name != NULL && strlen(z_name) > 0) data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:588:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(name) + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:590:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pty->name, name, len); data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:2009:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(pty->name) < 200); /* Check that prefix is large enough */ data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:2571:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(varname) + strlen("_diff_pty") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:2571:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(varname) + strlen("_diff_pty") + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.c:107:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(base_name) + 4; // 1 + 3 = "_00\n" data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.c:112:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(name) + 1; data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.c:114:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(n, name, len); data/code-saturne-6.2.0+repack/src/cdo/cs_xdef.h:305:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(z_name) > 0) { data/code-saturne-6.2.0+repack/src/cdo/cs_xdef.h:329:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(z_name) > 0) { data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:395:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(ct->criteria, strlen(zone_criteria)+1, char); data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:403:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen("cooling_towers_") + 3; data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:467:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen("cooling_towers_balance.") + 2 + 1; data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1824:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(name, strlen("esl_fraction_") + 2 + 1, char); data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1825:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(label, strlen("YM_ESL") + 2 + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:141:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n_chars += strlen(gc->group_name[j]) + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:161:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n_chars += strlen(gc->group_name[j]); data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:236:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(recv_chars + n_chars) + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:273:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(dest->group_name[i], strlen(src->group_name[i]) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:420:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(_class->group_name[i], strlen(group_names[i]) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_morton.c:546:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen("DistribOutput_l.dat")+1+2; data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:1151:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(this_nodal->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:1267:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(new_nodal->name, strlen(this_nodal->name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:2362:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(new_nodal->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c:240:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(set_group_names[0]) + 1, data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c:246:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(this_selector->group_name[j], strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c:332:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (int_len != (int)strlen(str)) data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:333:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). keywords_size += (strlen(keywords[i]) + 1); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:357:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(this_parser->operators[i].name, name, 15); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:362:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(keywords[i]) + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:462:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). = p->keyword[i-1] + strlen(p->keyword[i-1]) + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:581:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(infix); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:972:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t size = strlen(infix); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1156:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(pf->missing_operand[n], strlen(missing) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1183:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (int_len != (int)strlen(str)) data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1215:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (flt_len != (int)strlen(str)) data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1856:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (te->protected[i] == true || strlen(tok) != 1) data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1867:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (te->protected[j] == false && strlen(tok) == 1) { data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:2023:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t1_len = strlen(t1); data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:2047:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(t2) == 1) { data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:2116:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t t3_len = strlen(t3); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:250:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(s); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:258:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(s, check_strings[i], strlen(check_strings[i])) == 0) { data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:337:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:339:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_scripts[id], path, l); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:397:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:399:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_scripts[id], path, l); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:433:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int j = strlen(file_name) - 1; j > -1; j--) { data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:447:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(dir_path) + 1 + strlen(file_name) + 1, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:447:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(dir_path) + 1 + strlen(file_name) + 1, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:460:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(dir_path) + 1 + strlen(file_name) + 1, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:460:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(dir_path) + 1 + strlen(file_name) + 1, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1413:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1418:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->name, strlen(_name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1427:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l_tot = strlen(options); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1444:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(options + i1 + 11); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1446:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(w->input_name, options + i1 + 11, l); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1459:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->input_name, strlen(n)+1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1718:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_name, name, 127); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:580:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(state_name) + strlen(state_number) + 1, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:580:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(state_name) + strlen(state_number) + 1, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3107:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(full_name, strlen("CS_") + strlen(name) + strlen("XX") + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3107:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(full_name, strlen("CS_") + strlen(name) + strlen("XX") + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3107:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(full_name, strlen("CS_") + strlen(name) + strlen("XX") + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3250:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(vect_short_name, "E"); /* efforts */ data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3252:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(vect_short_name, "M"); /* mesh velocity */ data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3254:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(vect_short_name, "S"); /* velocity */ data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3258:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(vect_short_name, "U"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3261:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(vect_short_name, "V"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3264:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(vect_short_name, "W"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3391:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(short_name, name, 4); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3448:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(full_name, strlen(name) + strlen("CS_") + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3448:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(full_name, strlen(name) + strlen("CS_") + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3679:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_length = strlen(name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3694:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_length = strlen(path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3697:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mesh_filename_length = path_length + name_length + strlen(".ccmg") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3710:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mesh_basename_length = name_length + strlen(".ccmg") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3715:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(writer->path, strlen(path)+1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3877:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int path_length = strlen(w->path) + strlen(w->name) + 1 data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3877:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int path_length = strlen(w->path) + strlen(w->name) + 1 data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3878:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(s_time_step) + strlen(".ccmg") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3878:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(s_time_step) + strlen(".ccmg") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3882:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_length = strlen(w->name) + 1 data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3883:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(s_time_step) + strlen(".ccmg") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3883:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(s_time_step) + strlen(".ccmg") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3889:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmg") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3889:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmg") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3889:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmg") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3892:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_length = strlen(w->name) + strlen(".ccmg") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3892:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_length = strlen(w->name) + strlen(".ccmg") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4087:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int path_length = strlen(w->path) + strlen(w->name) + 1 data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4087:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int path_length = strlen(w->path) + strlen(w->name) + 1 data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4088:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(s_time_step) + strlen(".ccmp") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4088:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(s_time_step) + strlen(".ccmp") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4094:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmp") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4094:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmp") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4094:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmp") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:277:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_length = strlen(name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:283:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_length += strlen(postfix); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:299:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_length = strlen(path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:302:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename_length = path_length + name_length + strlen(".cgns") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:307:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). w->basename = w->filename + strlen(path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:575:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(writer->bases[i]->name, strlen(base_name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:674:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(base->name) + strlen("Zone 1") + strlen(nodename) + 4; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:674:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(base->name) + strlen("Zone 1") + strlen(nodename) + 4; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:674:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(base->name) + strlen("Zone 1") + strlen(nodename) + 4; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:754:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sol_length = strlen(sol_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:756:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(base->solutions[sol_id]->name, sol_name, sol_length + 1); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:3360:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(sol_names + sol_id * FVM_CGNS_NAME_SIZE, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:3536:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l_tot = strlen(options); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:3839:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(base_name, mesh->name, FVM_CGNS_NAME_SIZE); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4171:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(base_name, mesh->name, FVM_CGNS_NAME_SIZE); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4209:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(field_name, name, FVM_CGNS_NAME_SIZE); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4215:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (pos = strlen(field_name) - 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4223:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, field_name, shift); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:249:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, s, 80); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:255:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, s, 80); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:257:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(buf); i < 80; i++) data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:303:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, this_writer->name, 80); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:2566:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(this_writer->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:2611:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l_tot = strlen(options); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:3096:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, name, 80); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:3098:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, name, 80); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:284:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:297:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(description, name, l); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:370:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(line); /* At this stage, l = 31 at most */ data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:377:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(line); /* At this stage, l = 35 at most with data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:387:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (l = strlen(line); l < 61; l++) data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:394:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). prefix_len = strlen(this_case->file_name_prefix) data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:396:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). base_len = strlen(name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:430:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(var->file_name + strlen(var->file_name), data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:437:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( strlen(line) + strlen(var->file_name) data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:437:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( strlen(line) + strlen(var->file_name) data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:447:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(var->case_line + strlen(var->case_line) -5, "*****"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:451:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(var->case_line) > 1024) { data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:524:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(this_case->file_name_prefix) + strlen(extension) + 1, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:524:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(this_case->file_name_prefix) + strlen(extension) + 1, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:537:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(this_case->geom_file_name + strlen(this_case->geom_file_name) - 5, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:577:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(this_case->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:579:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = strlen(name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:588:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). prefix_len = strlen(dir_prefix); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:605:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(this_case->case_file_name) + 1, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:809:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(this_case->part_name[i], strlen(part_name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:899:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l_n = strlen(name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:910:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l_c = strlen(var->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:984:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(var->file_name + strlen(var->file_name) - 5, "%05d", var_index); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:1114:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int k = strlen(tmp)-1; k > 0; k--) { data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:468:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lce = strlen(tmpe); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:469:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lv = strlen(c->name) + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:485:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(w->path) + strlen(w->name) data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:485:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(w->path) + strlen(w->name) data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:486:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(t_stamp) + 4 + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:560:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:563:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->path, strlen(path) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:602:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l_tot = strlen(options); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:431:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(writer->med_meshes[id]->name, med_mesh_name, MED_NAME_SIZE); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:494:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(family_name) + 1; i < MED_NAME_SIZE; i++) data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:512:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(group_p, group_names[i], MED_LNAME_SIZE - 1); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1094:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(med_fieldname, base_fieldname, MED_NAME_SIZE); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1095:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n_chars = strlen(med_fieldname); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1104:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(med_fieldname + n_chars + 2, data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1108:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(med_fieldname); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1135:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(med_fieldname) + 1; i < MED_NAME_SIZE; i++) data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1177:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(med_fieldname, fieldname, MED_NAME_SIZE); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1178:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n_chars = strlen(med_fieldname); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4218:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l_tot = strlen(options); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4262:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_length = strlen(name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4276:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_length = strlen(path); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4279:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename_length = path_length + name_length + strlen(".med"); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4504:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(med_mesh_name, mesh->name, MED_NAME_SIZE); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4505:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n_chars = strlen(med_mesh_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4564:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(med_mesh_name, mesh->name, MED_NAME_SIZE); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4565:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n_chars = strlen(med_mesh_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4796:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(med_mesh_name, mesh->name, MED_NAME_SIZE); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4797:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n_chars = strlen(med_mesh_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx:948:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(writer->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx:953:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(writer->name, strlen(_name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:177:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lce = strlen(tmpe); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:178:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(c->name) + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:291:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l_tot = strlen(options); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:294:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int l_rs = strlen(rs); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:313:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(options_c, options+i1+l_rs, l_opt-l_rs); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:337:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:391:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_len = strlen(path) + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:393:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int tracefile_path_l = path_len + strlen(name) + strlen(".log") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:393:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int tracefile_path_l = path_len + strlen(name) + strlen(".log") + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:194:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(w->path) + strlen(w->name) data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:194:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(w->path) + strlen(w->name) data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:195:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(t_stamp) + 4 + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:243:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name_buf, c->name, 63); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:249:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(name_buf); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:330:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:333:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->path, strlen(path) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:376:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l_tot = strlen(options); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:181:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(w->prefix) + strlen("coords") + strlen(t_stamp) + 4 + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:181:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(w->prefix) + strlen("coords") + strlen(t_stamp) + 4 + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:181:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(w->prefix) + strlen("coords") + strlen(t_stamp) + 4 + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:330:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lce = strlen(tmpe); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:331:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(c->name) + 1; data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:441:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:444:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) > 0) { data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:445:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->prefix, strlen(path) + 1 + strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:445:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->prefix, strlen(path) + 1 + strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:449:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(w->prefix, strlen(path) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:492:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l_tot = strlen(options); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:473:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(option_list); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:524:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(_name, strlen(wf->dl_prefix) + strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:524:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(_name, strlen(wf->dl_prefix) + strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:658:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(this_writer->path); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:668:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(tmp_path); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:680:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lw = strlen(this_writer->name); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:684:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(mesh_name) > 0) { data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:685:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = lw + 1 + strlen(mesh_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:774:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(this_writer->mesh_names[i], strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:816:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(format_name); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:820:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp_name, format_name, 32); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1007:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(exclude_option); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1044:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i1 = strlen(tmp_options); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1149:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i1 = strlen(tmp_options); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1165:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(this_writer->name, strlen(name) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1178:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(this_writer->path, strlen(path) + 1, char); data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:2451:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(s); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:187:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(path0, strlen("numerical_parameters/") + strlen(param) + 1, char); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:187:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(path0, strlen("numerical_parameters/") + strlen(param) + 1, char); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:1490:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_REALLOC(vars->model, strlen("thermal_scalar")+1, char); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3089:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(tmp, strlen(f->name) + 13, char); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3399:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(f->name) + 4; data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3987:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(buf, strlen(s_list)+1, char); data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:4123:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(prefix) + 1; data/code-saturne-6.2.0+repack/src/gui/cs_gui_boundary_conditions.c:528:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (sscanf(name + strlen("coal"), "%d", &icoal) != 1) data/code-saturne-6.2.0+repack/src/gui/cs_gui_mesh.c:205:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t coeff_id = strlen("matrix_"); data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:391:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buffer) >= 127) data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:516:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(format_options, format_name[output_format], 63); data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:519:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(format_options); data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:520:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(format_options, ", no_time_step", 63-l); data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c:489:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(_boundary->label[izone], strlen(label)+1, char); data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c:492:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(_boundary->nature[izone], strlen(nature)+1, char); data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:624:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(cstr); data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1113:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(cstr); data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1591:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(vars->model, strlen(name)+1, char); data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1594:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(vars->model_value, strlen(model)+1, char); data/code-saturne-6.2.0+repack/src/gui/cs_gui_util.c:207:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(s1) != strlen(s2)) return 0; data/code-saturne-6.2.0+repack/src/gui/cs_gui_util.c:207:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(s1) != strlen(s2)) return 0; data/code-saturne-6.2.0+repack/src/gui/cs_gui_util.c:208:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(s1, s2, strlen(s1))) return 1; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:326:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(z_type_name, _("boundary"), 31); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:328:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(z_type_name, _("volume"), 31); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1142:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(z_type_name, _("boundary"), 31); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1144:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(z_type_name, _("volume"), 31); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1183:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(z_type_name, _("boundary"), 31); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1185:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(z_type_name, _("volume"), 31); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_options.c:140:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(varname); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1092:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(attr_name); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:263:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(attr_name); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:358:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l0 = strlen(_class_ext); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:381:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(group_name, "CS_LAGR_STAT_GROUP_PARTICLE", 63); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:384:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(group_name, "CS_LAGR_STAT_TRACKING_EVENT", 63); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1126:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l0 = strlen(_class_name); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1184:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l0 = strlen(_comp_name) + strlen(_class_name) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1184:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l0 = strlen(_comp_name) + strlen(_class_name) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1185:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(type_name[moment_type]); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1235:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l0 = strlen(_comp_name) + strlen(_class_name) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1235:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l0 = strlen(_comp_name) + strlen(_class_name) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1236:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(type_name[moment_type]); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1526:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_r_name, name, 63); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:2141:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(name); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3458:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mt->name, strlen(s)+1, char); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3513:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(b_stat_name[n_b_stat_types], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3524:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(b_stat_name[n_b_stat_types], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3535:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(b_stat_name[n_b_stat_types], data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3664:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, _lagr_stat_names[stat_type], 63); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3669:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, _lagr_stat_names[stat_type], 63); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3674:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, _lagr_stat_names[stat_type], 63); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3680:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, _lagr_stat_names[stat_type], 63); data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:4353:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cs_lagr_attribute_name[attr])) == 0) data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5437:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t l = strlen(name) + 1; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5459:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t l = strlen(name) + 1; data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5547:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(f->name), data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:104:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). base_len = strlen(basename); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:105:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen("log/JoinDBG__.dat")+1+4+2+base_len; data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:136:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). base_len = strlen(basename); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:137:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen("log/JoinDBG__.dat")+1+4+2+base_len; data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:294:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mesh_name, strlen("WorkMesh_j_n") + 2 + 5 + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:301:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mesh_name, strlen("WorkMesh_j") + 2 + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:379:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mesh_name, strlen("LocalMesh_n") + 5 + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:383:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mesh_name, strlen("LocalMesh") + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1454:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, _(" rank mean"), 79); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1456:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, _(" call mean"), 79); data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1458:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, _(" rank/call mean"), 79); data/code-saturne-6.2.0+repack/src/mesh/cs_join_intersect.c:3766:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen("JoinDBG_FaceVis.dat")+1+2+4; data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1129:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen("JoinDBG_InitMergeSet.dat")+1+2+4; data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1842:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen("JoinDBG_MergeSet.dat")+1+2+4; data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1991:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen("JoinDBG_EquivMerge.dat")+1+2+4; data/code-saturne-6.2.0+repack/src/mesh/cs_join_mesh.c:1474:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(name); data/code-saturne-6.2.0+repack/src/mesh/cs_join_mesh.c:1477:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(new_mesh->name, name, len); data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c:173:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mesh_name, strlen("WorkMesh_j_n") + 2 + 5 + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:454:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mesh_name, strlen("AdjacentJoinFaces_j") + 2 + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:475:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_REALLOC(mesh_name, strlen("JoinFacesAfterMerge_j") + 2 + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:555:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mesh_name, strlen("InteriorJoinedFaces_j") + 2 + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:579:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_REALLOC(mesh_name, strlen("BoundaryJoinedFaces_j") + 2 + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:644:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(name, strlen("CleanFaces_j") + 2 + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:700:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen("log/JoinDBG_.dat") + strlen(basename) + 4 + 2 + 1; data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:700:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen("log/JoinDBG_.dat") + strlen(basename) + 4 + 2 + 1; data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:726:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mesh_name, strlen(basename) + 2 + 2 + 5 + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.c:1832:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(type, "int", strlen("int"))) { /* "int" array */ data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.c:1840:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (!strncmp(type, "bool", strlen("bool"))) { /* "boolean" array */ data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.c:1852:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (!strncmp(type, "double", strlen("double"))) { /* "double" array */ data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.c:1860:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (!strncmp(type, "gnum", strlen("gnum"))) { /* "gnum" array */ data/code-saturne-6.2.0+repack/src/mesh/cs_join_split.c:1664:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(new_mesh_name, strlen("AfterSplitting_n") + 5 + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_join_update.c:2544:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen("JoinDBG_ErrorOrient.dat") + 4 + 1; data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2149:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(sel_criteria); data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2176:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(join->log_name, strlen(logname) + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:468:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mesh->group_idx[1] = strlen(name) + 1; data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:478:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(name) + 1; data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:748:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_tot += strlen(g_cur) + 1; data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:758:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_tot += strlen(g_cur) + 1; data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:774:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(mesh->group + mesh->group_idx[i]) + 1; data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:223:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ml_id = -1, reflen = strlen(ref_name); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:228:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(ml->name); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:296:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ml->name, name, 31); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:674:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(ml->select_str, strlen(criteria) + 1, char); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_save.c:164:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t ldir = 0, lname = strlen(filename); data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_save.c:170:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ldir = strlen(path); data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2395:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(dir) + strlen("domain_number_") + n_ranks_size + 2, data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2395:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(dir) + strlen("domain_number_") + n_ranks_size + 2, data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:150:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(stl_mesh->name, name, 9); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:124:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (strlen(line) > 1) { data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:133:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(temp); data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:138:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (strlen(line) > 1) { data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:147:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(temp); data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c:2702:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(f_sca->name)+6; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:234:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(field->name) + 7 + 1; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:301:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen("Resume-.log")+strlen(eqname)+1; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:301:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen("Resume-.log")+strlen(eqname)+1; data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-time_moments.c:413:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). BFT_MALLOC(mean_name, strlen(f->name) + 1 + 5, char); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-boundary_pressure_profile.c:172:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(name, "foil_profile", strlen("foil_profile")) == 0) { data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:282:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(name, "buicesat", strlen("buicesat")) == 0) { data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:353:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "U*10+x/h", 64); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:363:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "Y/H", 64); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:373:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "U/Uc", 64); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:383:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "uu/Uc^2", 64); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:392:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "uv/Uc^2", 64); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:401:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "vv/Uc^2", 64); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:410:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(var_name, "X", 64); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:492:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "X/H", 64); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:502:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "CP", 64); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:513:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "CF", 64); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:522:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "U/UREF", 64); data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:533:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(var_name, "YPLUS", 64); data/code-saturne-6.2.0+repack/tests/cs_file_test.c:58:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(header); i < 80; i++) data/code-saturne-6.2.0+repack/tests/cs_file_test.c:62:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(footer); i < 80; i++) data/code-saturne-6.2.0+repack/tests/cs_file_test.c:343:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(buf); i < 80; i++) data/code-saturne-6.2.0+repack/tests/cs_file_test.c:370:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(buf); i < 80; i++) data/code-saturne-6.2.0+repack/tests/cs_map_test.c:189:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tot += strlen(k_base[n_keys]); data/code-saturne-6.2.0+repack/tests/cs_map_test.c:191:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tot += strlen(f_base[n_fields]); ANALYSIS SUMMARY: Hits = 3004 Lines analyzed = 766862 in approximately 20.78 seconds (36901 lines/second) Physical Source Lines of Code (SLOC) = 390120 Hits@level = [0] 1745 [1] 1049 [2] 1349 [3] 96 [4] 510 [5] 0 Hits@level+ = [0+] 4749 [1+] 3004 [2+] 1955 [3+] 606 [4+] 510 [5+] 0 Hits/KSLOC@level+ = [0+] 12.1732 [1+] 7.70019 [2+] 5.01128 [3+] 1.55337 [4+] 1.30729 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.