Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/dropbear-2020.81/termcodes.h
Examining data/dropbear-2020.81/fuzz-common.c
Examining data/dropbear-2020.81/dbmulti.c
Examining data/dropbear-2020.81/cli-runopts.c
Examining data/dropbear-2020.81/fuzzer-client_nomaths.c
Examining data/dropbear-2020.81/atomicio.c
Examining data/dropbear-2020.81/pubkeyapi.h
Examining data/dropbear-2020.81/cli-authinteract.c
Examining data/dropbear-2020.81/buffer.c
Examining data/dropbear-2020.81/svr-agentfwd.c
Examining data/dropbear-2020.81/signkey.h
Examining data/dropbear-2020.81/list.c
Examining data/dropbear-2020.81/dbrandom.h
Examining data/dropbear-2020.81/channel.h
Examining data/dropbear-2020.81/cli-tcpfwd.c
Examining data/dropbear-2020.81/debug.h
Examining data/dropbear-2020.81/gened25519.h
Examining data/dropbear-2020.81/svr-runopts.c
Examining data/dropbear-2020.81/svr-auth.c
Examining data/dropbear-2020.81/listener.h
Examining data/dropbear-2020.81/keyimport.h
Examining data/dropbear-2020.81/ed25519.c
Examining data/dropbear-2020.81/svr-session.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_sqr.c
Examining data/dropbear-2020.81/libtommath/bn_prime_tab.c
Examining data/dropbear-2020.81/libtommath/bn_mp_radix_size.c
Examining data/dropbear-2020.81/libtommath/bn_mp_get_ll.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_mul_digs_fast.c
Examining data/dropbear-2020.81/libtommath/bn_mp_cmp_mag.c
Examining data/dropbear-2020.81/libtommath/bn_mp_set_ll.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init_i64.c
Examining data/dropbear-2020.81/libtommath/bn_mp_cnt_lsb.c
Examining data/dropbear-2020.81/libtommath/bn_mp_2expt.c
Examining data/dropbear-2020.81/libtommath/bn_mp_mod_2d.c
Examining data/dropbear-2020.81/libtommath/bn_mp_sub.c
Examining data/dropbear-2020.81/libtommath/bn_mp_reduce_2k_l.c
Examining data/dropbear-2020.81/libtommath/bn_mp_pack_count.c
Examining data/dropbear-2020.81/libtommath/bn_mp_kronecker.c
Examining data/dropbear-2020.81/libtommath/bn_mp_count_bits.c
Examining data/dropbear-2020.81/libtommath/bn_mp_clear_multi.c
Examining data/dropbear-2020.81/libtommath/tommath_private.h
Examining data/dropbear-2020.81/libtommath/tommath_cutoffs.h
Examining data/dropbear-2020.81/libtommath/bn_mp_cmp.c
Examining data/dropbear-2020.81/libtommath/bn_mp_add.c
Examining data/dropbear-2020.81/libtommath/bn_mp_grow.c
Examining data/dropbear-2020.81/libtommath/bn_mp_prime_fermat.c
Examining data/dropbear-2020.81/libtommath/bn_mp_to_radix.c
Examining data/dropbear-2020.81/libtommath/bn_mp_shrink.c
Examining data/dropbear-2020.81/libtommath/bn_mp_abs.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_mul_high_digs.c
Examining data/dropbear-2020.81/libtommath/bn_mp_set_u64.c
Examining data/dropbear-2020.81/libtommath/bn_mp_set_ul.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_sqr_fast.c
Examining data/dropbear-2020.81/libtommath/bn_mp_to_sbin.c
Examining data/dropbear-2020.81/libtommath/bn_mp_reduce_2k_setup_l.c
Examining data/dropbear-2020.81/libtommath/bn_mp_from_sbin.c
Examining data/dropbear-2020.81/libtommath/bn_mp_div_2.c
Examining data/dropbear-2020.81/libtommath/bn_mp_set_ull.c
Examining data/dropbear-2020.81/libtommath/bn_mp_rshd.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_mul_digs.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init_ul.c
Examining data/dropbear-2020.81/libtommath/bn_mp_mul_d.c
Examining data/dropbear-2020.81/libtommath/bn_deprecated.c
Examining data/dropbear-2020.81/libtommath/bn_mp_fwrite.c
Examining data/dropbear-2020.81/libtommath/bn_mp_lshd.c
Examining data/dropbear-2020.81/libtommath/bn_mp_reduce_is_2k_l.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_invmod_slow.c
Examining data/dropbear-2020.81/libtommath/bn_mp_prime_rabin_miller_trials.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_rand_platform.c
Examining data/dropbear-2020.81/libtommath/bn_mp_get_mag_u32.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_prime_is_divisible.c
Examining data/dropbear-2020.81/libtommath/bn_mp_get_l.c
Examining data/dropbear-2020.81/libtommath/bn_mp_and.c
Examining data/dropbear-2020.81/libtommath/bn_mp_cmp_d.c
Examining data/dropbear-2020.81/libtommath/bn_mp_set_i32.c
Examining data/dropbear-2020.81/libtommath/bn_mp_log_u32.c
Examining data/dropbear-2020.81/libtommath/bn_mp_lcm.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_get_bit.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_montgomery_reduce_fast.c
Examining data/dropbear-2020.81/libtommath/bn_mp_is_square.c
Examining data/dropbear-2020.81/libtommath/bn_mp_sqrt.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init_u32.c
Examining data/dropbear-2020.81/libtommath/bn_mp_signed_rsh.c
Examining data/dropbear-2020.81/libtommath/bn_mp_mod_d.c
Examining data/dropbear-2020.81/libtommath/bn_mp_sqrtmod_prime.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init_multi.c
Examining data/dropbear-2020.81/libtommath/bn_mp_to_ubin.c
Examining data/dropbear-2020.81/libtommath/bn_mp_get_i32.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_rand_jenkins.c
Examining data/dropbear-2020.81/libtommath/bn_mp_pack.c
Examining data/dropbear-2020.81/libtommath/bn_mp_from_ubin.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_mul_high_digs_fast.c
Examining data/dropbear-2020.81/libtommath/bn_mp_reduce_is_2k.c
Examining data/dropbear-2020.81/libtommath/tommath_class.h
Examining data/dropbear-2020.81/libtommath/bn_mp_init_set.c
Examining data/dropbear-2020.81/libtommath/bn_mp_invmod.c
Examining data/dropbear-2020.81/libtommath/bn_mp_dr_reduce.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init_size.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_exptmod_fast.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init_ll.c
Examining data/dropbear-2020.81/libtommath/bn_mp_incr.c
Examining data/dropbear-2020.81/libtommath/bn_mp_submod.c
Examining data/dropbear-2020.81/libtommath/bn_mp_set_u32.c
Examining data/dropbear-2020.81/libtommath/bn_mp_ubin_size.c
Examining data/dropbear-2020.81/libtommath/bn_mp_montgomery_reduce.c
Examining data/dropbear-2020.81/libtommath/bn_mp_exteuclid.c
Examining data/dropbear-2020.81/libtommath/bn_mp_neg.c
Examining data/dropbear-2020.81/libtommath/bn_mp_clamp.c
Examining data/dropbear-2020.81/libtommath/bn_mp_dr_setup.c
Examining data/dropbear-2020.81/libtommath/bn_mp_copy.c
Examining data/dropbear-2020.81/libtommath/bn_mp_decr.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_karatsuba_mul.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init_copy.c
Examining data/dropbear-2020.81/libtommath/bn_mp_prime_rand.c
Examining data/dropbear-2020.81/libtommath/tommath_superclass.h
Examining data/dropbear-2020.81/libtommath/bn_mp_div_d.c
Examining data/dropbear-2020.81/libtommath/bn_mp_fread.c
Examining data/dropbear-2020.81/libtommath/bn_mp_reduce.c
Examining data/dropbear-2020.81/libtommath/bn_mp_mod.c
Examining data/dropbear-2020.81/libtommath/bn_mp_montgomery_calc_normalization.c
Examining data/dropbear-2020.81/libtommath/bn_mp_get_mag_ul.c
Examining data/dropbear-2020.81/libtommath/bn_mp_prime_miller_rabin.c
Examining data/dropbear-2020.81/libtommath/bn_mp_zero.c
Examining data/dropbear-2020.81/libtommath/bn_mp_sqr.c
Examining data/dropbear-2020.81/libtommath/bn_mp_addmod.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init.c
Examining data/dropbear-2020.81/libtommath/bn_mp_sbin_size.c
Examining data/dropbear-2020.81/libtommath/bn_mp_prime_is_prime.c
Examining data/dropbear-2020.81/libtommath/bn_mp_radix_smap.c
Examining data/dropbear-2020.81/libtommath/bn_mp_div.c
Examining data/dropbear-2020.81/libtommath/bn_mp_clear.c
Examining data/dropbear-2020.81/libtommath/bn_mp_xor.c
Examining data/dropbear-2020.81/libtommath/bn_mp_error_to_string.c
Examining data/dropbear-2020.81/libtommath/bn_mp_exptmod.c
Examining data/dropbear-2020.81/libtommath/bn_mp_reduce_setup.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_toom_mul.c
Examining data/dropbear-2020.81/libtommath/bn_mp_or.c
Examining data/dropbear-2020.81/libtommath/bn_mp_read_radix.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_sub.c
Examining data/dropbear-2020.81/libtommath/bn_mp_prime_frobenius_underwood.c
Examining data/dropbear-2020.81/libtommath/bn_mp_set.c
Examining data/dropbear-2020.81/libtommath/bn_mp_div_2d.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init_i32.c
Examining data/dropbear-2020.81/libtommath/bn_mp_iseven.c
Examining data/dropbear-2020.81/libtommath/bn_mp_reduce_2k_setup.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_add.c
Examining data/dropbear-2020.81/libtommath/bn_mp_exch.c
Examining data/dropbear-2020.81/libtommath/bn_mp_prime_next_prime.c
Examining data/dropbear-2020.81/libtommath/bn_mp_sub_d.c
Examining data/dropbear-2020.81/libtommath/bn_mp_gcd.c
Examining data/dropbear-2020.81/libtommath/bn_mp_mul.c
Examining data/dropbear-2020.81/libtommath/bn_mp_rand.c
Examining data/dropbear-2020.81/libtommath/bn_mp_expt_u32.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init_u64.c
Examining data/dropbear-2020.81/libtommath/bn_mp_mul_2d.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_balance_mul.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_exptmod.c
Examining data/dropbear-2020.81/libtommath/bn_mp_get_i64.c
Examining data/dropbear-2020.81/libtommath/bn_mp_prime_strong_lucas_selfridge.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init_ull.c
Examining data/dropbear-2020.81/libtommath/bn_mp_montgomery_setup.c
Examining data/dropbear-2020.81/libtommath/bn_mp_reduce_2k.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_toom_sqr.c
Examining data/dropbear-2020.81/libtommath/bn_mp_isodd.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_karatsuba_sqr.c
Examining data/dropbear-2020.81/libtommath/bn_mp_get_mag_u64.c
Examining data/dropbear-2020.81/libtommath/tommath.h
Examining data/dropbear-2020.81/libtommath/bn_mp_root_u32.c
Examining data/dropbear-2020.81/libtommath/bn_mp_add_d.c
Examining data/dropbear-2020.81/libtommath/bn_mp_sqrmod.c
Examining data/dropbear-2020.81/libtommath/bn_mp_dr_is_modulus.c
Examining data/dropbear-2020.81/libtommath/bn_mp_complement.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_invmod_fast.c
Examining data/dropbear-2020.81/libtommath/bn_cutoffs.c
Examining data/dropbear-2020.81/libtommath/bn_mp_get_mag_ull.c
Examining data/dropbear-2020.81/libtommath/bn_mp_unpack.c
Examining data/dropbear-2020.81/libtommath/bn_s_mp_reverse.c
Examining data/dropbear-2020.81/libtommath/bn_mp_mul_2.c
Examining data/dropbear-2020.81/libtommath/bn_mp_set_l.c
Examining data/dropbear-2020.81/libtommath/bn_mp_set_i64.c
Examining data/dropbear-2020.81/libtommath/bn_mp_init_l.c
Examining data/dropbear-2020.81/libtommath/bn_mp_mulmod.c
Examining data/dropbear-2020.81/libtommath/bn_mp_div_3.c
Examining data/dropbear-2020.81/svr-authpasswd.c
Examining data/dropbear-2020.81/compat.c
Examining data/dropbear-2020.81/ltc_prng.h
Examining data/dropbear-2020.81/common-kex.c
Examining data/dropbear-2020.81/crypto_desc.c
Examining data/dropbear-2020.81/gensignkey.c
Examining data/dropbear-2020.81/common-chansession.c
Examining data/dropbear-2020.81/fuzzer-kexdh.c
Examining data/dropbear-2020.81/scpmisc.c
Examining data/dropbear-2020.81/dh_groups.c
Examining data/dropbear-2020.81/service.h
Examining data/dropbear-2020.81/cli-session.c
Examining data/dropbear-2020.81/packet.c
Examining data/dropbear-2020.81/cli-main.c
Examining data/dropbear-2020.81/curve25519.c
Examining data/dropbear-2020.81/genrsa.c
Examining data/dropbear-2020.81/progressmeter.c
Examining data/dropbear-2020.81/svr-kex.c
Examining data/dropbear-2020.81/rsa.c
Examining data/dropbear-2020.81/fake-rfc2553.h
Examining data/dropbear-2020.81/fuzz-wrapfd.c
Examining data/dropbear-2020.81/chansession.h
Examining data/dropbear-2020.81/dbmalloc.c
Examining data/dropbear-2020.81/chachapoly.h
Examining data/dropbear-2020.81/gcm.c
Examining data/dropbear-2020.81/ecc.c
Examining data/dropbear-2020.81/netio.h
Examining data/dropbear-2020.81/dbhelpers.c
Examining data/dropbear-2020.81/svr-authpubkey.c
Examining data/dropbear-2020.81/gendss.c
Examining data/dropbear-2020.81/loginrec.h
Examining data/dropbear-2020.81/common-channel.c
Examining data/dropbear-2020.81/queue.c
Examining data/dropbear-2020.81/ecdsa.h
Examining data/dropbear-2020.81/dss.c
Examining data/dropbear-2020.81/fuzzer-verify.c
Examining data/dropbear-2020.81/fuzzer-preauth.c
Examining data/dropbear-2020.81/fuzzer-kexecdh.c
Examining data/dropbear-2020.81/bignum.c
Examining data/dropbear-2020.81/options.h
Examining data/dropbear-2020.81/fuzz-hostkeys.c
Examining data/dropbear-2020.81/sshpty.c
Examining data/dropbear-2020.81/circbuffer.c
Examining data/dropbear-2020.81/svr-authpubkeyoptions.c
Examining data/dropbear-2020.81/dbutil.h
Examining data/dropbear-2020.81/algo.h
Examining data/dropbear-2020.81/sysoptions.h
Examining data/dropbear-2020.81/cli-kex.c
Examining data/dropbear-2020.81/dbrandom.c
Examining data/dropbear-2020.81/gened25519.c
Examining data/dropbear-2020.81/svr-authpam.c
Examining data/dropbear-2020.81/list.h
Examining data/dropbear-2020.81/signkey.c
Examining data/dropbear-2020.81/buffer.h
Examining data/dropbear-2020.81/dropbearkey.c
Examining data/dropbear-2020.81/session.h
Examining data/dropbear-2020.81/dropbearconvert.c
Examining data/dropbear-2020.81/kex.h
Examining data/dropbear-2020.81/cli-chansession.c
Examining data/dropbear-2020.81/agentfwd.h
Examining data/dropbear-2020.81/atomicio.h
Examining data/dropbear-2020.81/ssh.h
Examining data/dropbear-2020.81/svr-service.c
Examining data/dropbear-2020.81/svr-tcpfwd.c
Examining data/dropbear-2020.81/fuzzer-client.c
Examining data/dropbear-2020.81/tcpfwd.h
Examining data/dropbear-2020.81/cli-agentfwd.c
Examining data/dropbear-2020.81/termcodes.c
Examining data/dropbear-2020.81/fuzzer-kexcurve25519.c
Examining data/dropbear-2020.81/dh_groups.h
Examining data/dropbear-2020.81/svr-main.c
Examining data/dropbear-2020.81/scpmisc.h
Examining data/dropbear-2020.81/packet.h
Examining data/dropbear-2020.81/cli-channel.c
Examining data/dropbear-2020.81/fuzz.h
Examining data/dropbear-2020.81/cli-authpubkey.c
Examining data/dropbear-2020.81/ltc_prng.c
Examining data/dropbear-2020.81/compat.h
Examining data/dropbear-2020.81/gensignkey.h
Examining data/dropbear-2020.81/crypto_desc.h
Examining data/dropbear-2020.81/runopts.h
Examining data/dropbear-2020.81/scp.c
Examining data/dropbear-2020.81/keyimport.c
Examining data/dropbear-2020.81/ed25519.h
Examining data/dropbear-2020.81/auth.h
Examining data/dropbear-2020.81/listener.c
Examining data/dropbear-2020.81/gcm.h
Examining data/dropbear-2020.81/chachapoly.c
Examining data/dropbear-2020.81/dbhelpers.h
Examining data/dropbear-2020.81/netio.c
Examining data/dropbear-2020.81/ecc.h
Examining data/dropbear-2020.81/common-runopts.c
Examining data/dropbear-2020.81/dbmalloc.h
Examining data/dropbear-2020.81/rsa.h
Examining data/dropbear-2020.81/common-algo.c
Examining data/dropbear-2020.81/svr-x11fwd.c
Examining data/dropbear-2020.81/fuzz-wrapfd.h
Examining data/dropbear-2020.81/fake-rfc2553.c
Examining data/dropbear-2020.81/fuzzer-preauth_nomaths.c
Examining data/dropbear-2020.81/cli-authpasswd.c
Examining data/dropbear-2020.81/svr-chansession.c
Examining data/dropbear-2020.81/curve25519.h
Examining data/dropbear-2020.81/tcp-accept.c
Examining data/dropbear-2020.81/x11fwd.h
Examining data/dropbear-2020.81/progressmeter.h
Examining data/dropbear-2020.81/genrsa.h
Examining data/dropbear-2020.81/libtomcrypt/testprof/katja_test.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/modes_test.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/ecc_test.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/cipher_hash_test.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/test_driver.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/rsa_test.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/store_test.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/pkcs_1_test.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/tomcrypt_test.h
Examining data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/dsa_test.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/mac_test.c
Examining data/dropbear-2020.81/libtomcrypt/testprof/base64_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/katja_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/misc_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/common.c
Examining data/dropbear-2020.81/libtomcrypt/tests/modes_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/dh_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/file_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/ecc_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/cipher_hash_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/prng_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/pkcs_1_oaep_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/der_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/rsa_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/pkcs_1_eme_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/store_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/common.h
Examining data/dropbear-2020.81/libtomcrypt/tests/pkcs_1_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/tomcrypt_test.h
Examining data/dropbear-2020.81/libtomcrypt/tests/test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/rotate_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/pkcs_1_emsa_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/multi_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/pkcs_1_pss_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/dsa_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/mac_test.c
Examining data/dropbear-2020.81/libtomcrypt/tests/no_prng.c
Examining data/dropbear-2020.81/libtomcrypt/tests/base64_test.c
Examining data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15sign-vectors.c
Examining data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c
Examining data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c
Examining data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c
Examining data/dropbear-2020.81/libtomcrypt/notes/etc/whirltest.c
Examining data/dropbear-2020.81/libtomcrypt/notes/etc/saferp_optimizer.c
Examining data/dropbear-2020.81/libtomcrypt/notes/etc/whirlgen.c
Examining data/dropbear-2020.81/libtomcrypt/demos/constants.c
Examining data/dropbear-2020.81/libtomcrypt/demos/small.c
Examining data/dropbear-2020.81/libtomcrypt/demos/encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/demos/hashsum.c
Examining data/dropbear-2020.81/libtomcrypt/demos/ltcrypt.c
Examining data/dropbear-2020.81/libtomcrypt/demos/multi.c
Examining data/dropbear-2020.81/libtomcrypt/demos/openssl-enc.c
Examining data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c
Examining data/dropbear-2020.81/libtomcrypt/demos/sizes.c
Examining data/dropbear-2020.81/libtomcrypt/demos/test.c
Examining data/dropbear-2020.81/libtomcrypt/demos/timing.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/compare_testvector.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/pk_get_oid.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/error_to_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_unregister_prng.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_unregister_cipher.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_find_cipher_any.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_prng_descriptor.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_constants.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_prng_is_valid.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_prng_rng_descriptor.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_cipher_is_valid.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_find_hash_oid.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_hash_descriptor.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_register_all_ciphers.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_register_prng.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_register_cipher.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_find_hash.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_inits.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_cipher_descriptor.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_register_all_hashes.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_find_cipher.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_find_hash_id.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_ltc_mp_descriptor.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_find_cipher_id.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_register_hash.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_hash_is_valid.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_find_prng.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_argchk.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_sizes.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_find_hash_any.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_register_all_prngs.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_fsa.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crypt/crypt_unregister_hash.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/base64/base64_decode.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/base64/base64_encode.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/pkcs5/pkcs_5_1.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/pkcs5/pkcs_5_2.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/pkcs5/pkcs_5_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/crc32.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/burn_stack.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/hkdf/hkdf_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/hkdf/hkdf.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/zeromem.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/mem_neq.c
Examining data/dropbear-2020.81/libtomcrypt/src/misc/adler32.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/octet/der_decode_octet_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/octet/der_encode_octet_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/octet/der_length_octet_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/bit/der_length_bit_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/bit/der_encode_raw_bit_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/bit/der_decode_raw_bit_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/bit/der_encode_bit_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/bit/der_decode_bit_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/object_identifier/der_encode_object_identifier.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/object_identifier/der_decode_object_identifier.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/object_identifier/der_length_object_identifier.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/utf8/der_encode_utf8_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/utf8/der_decode_utf8_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/utf8/der_length_utf8_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/generalizedtime/der_decode_generalizedtime.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/generalizedtime/der_encode_generalizedtime.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/generalizedtime/der_length_generalizedtime.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/short_integer/der_length_short_integer.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/short_integer/der_encode_short_integer.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/short_integer/der_decode_short_integer.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/choice/der_decode_choice.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/ia5/der_length_ia5_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/ia5/der_encode_ia5_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/ia5/der_decode_ia5_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/teletex_string/der_decode_teletex_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/teletex_string/der_length_teletex_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/boolean/der_decode_boolean.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/boolean/der_length_boolean.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/boolean/der_encode_boolean.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/integer/der_length_integer.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/integer/der_decode_integer.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/integer/der_encode_integer.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/set/der_encode_setof.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/set/der_encode_set.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/sequence/der_encode_sequence_ex.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/sequence/der_sequence_shrink.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/sequence/der_length_sequence.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/sequence/der_encode_subject_public_key_info.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/sequence/der_decode_sequence_ex.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/sequence/der_decode_sequence_multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/sequence/der_decode_sequence_flexi.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/sequence/der_encode_sequence_multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/sequence/der_sequence_free.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/sequence/der_decode_subject_public_key_info.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/printable_string/der_encode_printable_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/printable_string/der_length_printable_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/printable_string/der_decode_printable_string.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/utctime/der_encode_utctime.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/utctime/der_length_utctime.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/utctime/der_decode_utctime.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_import.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_set.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_shared_secret.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_export_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_set_pg_dhparam.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_check_pubkey.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_free.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_generate_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_export.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_verify_hash.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_import_pkcs8.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_exptmod.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_free.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_decrypt_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_encrypt_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_import.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_sign_hash.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_set.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_import_x509.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_make_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_export.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_sign_saltlen_get.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/rsa/rsa_get_size.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_make_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_verify_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_set.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_sign_hash.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_shared_secret.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_generate_pqg.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_import.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_decrypt_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_set_pqg_dsaparam.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_export.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_verify_hash.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_generate_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_free.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_encrypt_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/katja/katja_import.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/katja/katja_decrypt_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/katja/katja_free.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/katja/katja_encrypt_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/katja/katja_make_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/katja/katja_exptmod.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/katja/katja_export.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ltc_ecc_projective_add_point.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_make_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_ansi_x963_import.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ltc_ecc_map.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_get_size.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_export.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_free.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_import.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_decrypt_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_shared_secret.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ltc_ecc_projective_dbl_point.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_sizes.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ltc_ecc_mul2add.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ltc_ecc_points.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ltc_ecc_mulmod.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_verify_hash.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ltc_ecc_mulmod_timing.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ltc_ecc_is_valid_idx.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_ansi_x963_export.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_sign_hash.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_encrypt_key.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_os2ip.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_pss_decode.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_pss_encode.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_mgf1.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_oaep_decode.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_v1_5_decode.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_v1_5_encode.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_oaep_encode.c
Examining data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_i2osp.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/md4.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512_224.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512_256.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha224.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha256.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha384.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/whirl/whirltab.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/whirl/whirl.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/sha1.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/rmd128.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/chc/chc.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/rmd256.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/md2.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/md5.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/tiger.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/sha3.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/helper/hash_memory_multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/helper/hash_file.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/helper/hash_filehandle.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/helper/hash_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/rmd160.c
Examining data/dropbear-2020.81/libtomcrypt/src/hashes/rmd320.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_mult_x.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ctr/ctr_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ctr/ctr_setiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ctr/ctr_start.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ctr/ctr_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ctr/ctr_getiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ctr/ctr_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ctr/ctr_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ofb/ofb_getiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ofb/ofb_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ofb/ofb_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ofb/ofb_start.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ofb/ofb_setiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ofb/ofb_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cbc/cbc_setiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cbc/cbc_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cbc/cbc_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cbc/cbc_getiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cbc/cbc_start.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cbc/cbc_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_process.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_setiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_start.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_getiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_start.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_getiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_test_mode.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_setiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cfb/cfb_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cfb/cfb_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cfb/cfb_start.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cfb/cfb_getiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cfb/cfb_setiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/cfb/cfb_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ecb/ecb_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ecb/ecb_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ecb/ecb_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/modes/ecb/ecb_start.c
Examining data/dropbear-2020.81/libtomcrypt/src/prngs/chacha20.c
Examining data/dropbear-2020.81/libtomcrypt/src/prngs/rc4.c
Examining data/dropbear-2020.81/libtomcrypt/src/prngs/rng_get_bytes.c
Examining data/dropbear-2020.81/libtomcrypt/src/prngs/fortuna.c
Examining data/dropbear-2020.81/libtomcrypt/src/prngs/rng_make_prng.c
Examining data/dropbear-2020.81/libtomcrypt/src/prngs/sober128tab.c
Examining data/dropbear-2020.81/libtomcrypt/src/prngs/sober128.c
Examining data/dropbear-2020.81/libtomcrypt/src/prngs/sprng.c
Examining data/dropbear-2020.81/libtomcrypt/src/prngs/yarrow.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/eax/eax_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/eax/eax_decrypt_verify_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/eax/eax_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/eax/eax_encrypt_authenticate_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/eax/eax_addheader.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/eax/eax_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/eax/eax_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/eax/eax_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_process.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_reset.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_mult_h.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_add_iv.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_add_aad.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_gf_mult.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_add_aad.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_add_nonce.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_process.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_reset.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_add_aad.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_setiv_rfc7905.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_setiv.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_ntz.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_shift_xor.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_encrypt_authenticate_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/s_ocb_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_done_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_done_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_decrypt_verify_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_int_ntz.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_encrypt_authenticate_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_add_aad.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_encrypt_last.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_int_xor_blocks.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_decrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_decrypt_verify_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_encrypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_decrypt_last.c
Examining data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/rc4/rc4_stream.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/rc4/rc4_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/chacha/chacha_ivctr32.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/chacha/chacha_crypt.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/chacha/chacha_keystream.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/chacha/chacha_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/chacha/chacha_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/chacha/chacha_ivctr64.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/chacha/chacha_setup.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/sober128/sober128tab.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/sober128/sober128_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/stream/sober128/sober128_stream.c
Examining data/dropbear-2020.81/libtomcrypt/src/math/radix_to_bin.c
Examining data/dropbear-2020.81/libtomcrypt/src/math/tfm_desc.c
Examining data/dropbear-2020.81/libtomcrypt/src/math/rand_bn.c
Examining data/dropbear-2020.81/libtomcrypt/src/math/fp/ltc_ecc_fp_mulmod.c
Examining data/dropbear-2020.81/libtomcrypt/src/math/multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/math/ltm_desc.c
Examining data/dropbear-2020.81/libtomcrypt/src/math/gmp_desc.c
Examining data/dropbear-2020.81/libtomcrypt/src/math/rand_prime.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_shift_xor.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_ntz.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_file.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_memory_multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_process.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_file.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_memory_multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_process.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2bmac_file.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2smac_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2bmac_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2bmac_memory_multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2smac.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2smac_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2smac_file.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2smac_memory_multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2bmac_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2bmac.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/poly1305/poly1305_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/poly1305/poly1305_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/poly1305/poly1305_file.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/poly1305/poly1305.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/poly1305/poly1305_memory_multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/xcbc/xcbc_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/xcbc/xcbc_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/xcbc/xcbc_process.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/xcbc/xcbc_file.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/xcbc/xcbc_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/xcbc/xcbc_memory_multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/xcbc/xcbc_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/f9/f9_memory_multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/f9/f9_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/f9/f9_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/f9/f9_process.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/f9/f9_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/f9/f9_file.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/f9/f9_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pelican/pelican.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pelican/pelican_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/pelican/pelican_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/omac/omac_init.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/omac/omac_file.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/omac/omac_test.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/omac/omac_process.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/omac/omac_memory_multi.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/omac/omac_memory.c
Examining data/dropbear-2020.81/libtomcrypt/src/mac/omac/omac_done.c
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_pkcs.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_macros.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_math.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_misc.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_dropbear.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_pk.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cfg.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_prng.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_custom.h
Examining data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_argchk.h
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/noekeon.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/camellia.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/safer.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/saferp.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/safer_tab.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/kseed.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/des.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/khazad.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/blowfish.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/kasumi.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/anubis.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/rc2.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/rc6.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/skipjack.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/cast5.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/xtea.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/multi2.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/twofish/twofish.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/twofish/twofish_tab.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/rc5.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/aes/aes.c
Examining data/dropbear-2020.81/libtomcrypt/src/ciphers/aes/aes_tab.c
Examining data/dropbear-2020.81/circbuffer.h
Examining data/dropbear-2020.81/dbutil.c
Examining data/dropbear-2020.81/sshpty.h
Examining data/dropbear-2020.81/bignum.h
Examining data/dropbear-2020.81/ecdsa.c
Examining data/dropbear-2020.81/queue.h
Examining data/dropbear-2020.81/default_options.h
Examining data/dropbear-2020.81/process-packet.c
Examining data/dropbear-2020.81/common-session.c
Examining data/dropbear-2020.81/dss.h
Examining data/dropbear-2020.81/fuzzer-pubkey.c
Examining data/dropbear-2020.81/gendss.h
Examining data/dropbear-2020.81/fuzz-harness.c
Examining data/dropbear-2020.81/cli-auth.c
Examining data/dropbear-2020.81/loginrec.c
Examining data/dropbear-2020.81/includes.h
Examining data/dropbear-2020.81/localoptions.h

FINAL RESULTS:

data/dropbear-2020.81/scp.c:972:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
					(void) chmod(np, mode);
data/dropbear-2020.81/scp.c:989:12:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
				(void) chmod(vect[0], mode);
data/dropbear-2020.81/scp.c:1064:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
				if (chmod(np, omode)) {
data/dropbear-2020.81/scp.c:1075:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
				if (chmod(np, omode & ~mask)) {
data/dropbear-2020.81/sshpty.c:250:6:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
	if (chown(tty_name, (uid_t) 0, (gid_t) 0) < 0
data/dropbear-2020.81/sshpty.c:255:6:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	if (chmod(tty_name, (mode_t) 0666) < 0
data/dropbear-2020.81/sshpty.c:384:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
		if (chown(tty_name, pw->pw_uid, gid) < 0) {
data/dropbear-2020.81/sshpty.c:400:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if (chmod(tty_name, mode) < 0) {
data/dropbear-2020.81/cli-auth.c:349:13:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
	password = getpass(prompt);
data/dropbear-2020.81/cli-authpasswd.c:84:3:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execlp(helper, helper, prompt, (char *)0);
data/dropbear-2020.81/cli-runopts.c:53:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, "Dropbear SSH client v%s https://matt.ucc.asn.au/dropbear/dropbear.html\n"
data/dropbear-2020.81/cli-session.c:423:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(exitmsg, sizeof(exitmsg), format, param);
data/dropbear-2020.81/cli-session.c:463:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(printbuf, sizeof(printbuf), format, param);
data/dropbear-2020.81/dbhelpers.h:10:55:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ATTRIB_PRINTF(fmt,args) __attribute__((format(printf, fmt, args))) 
data/dropbear-2020.81/dbmulti.c:82:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, "Dropbear SSH multi-purpose v%s\n"
data/dropbear-2020.81/dbutil.c:141:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(printbuf, sizeof(printbuf), format, param);
data/dropbear-2020.81/dbutil.c:197:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, format, param);
data/dropbear-2020.81/dbutil.c:216:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, format, param);
data/dropbear-2020.81/dbutil.c:383:2:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execv(usershell, argv);
data/dropbear-2020.81/dropbearkey.c:73:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, "Usage: %s -t <type> -f <filename> [-s bits]\n"
data/dropbear-2020.81/fuzz-common.c:54:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        vsnprintf(printbuf, sizeof(printbuf), format, param);
data/dropbear-2020.81/libtomcrypt/demos/test.c:20:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("\nstore_test...."); fflush(stdout); x = store_test();       printf(x ? "failed" : "passed");if (x) exit(EXIT_FAILURE);
data/dropbear-2020.81/libtomcrypt/demos/test.c:21:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("\ncipher_test..."); fflush(stdout); x = cipher_hash_test(); printf(x ? "failed" : "passed");if (x) exit(EXIT_FAILURE);
data/dropbear-2020.81/libtomcrypt/demos/test.c:22:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("\nmodes_test...."); fflush(stdout); x = modes_test();       printf(x ? "failed" : "passed");if (x) exit(EXIT_FAILURE);
data/dropbear-2020.81/libtomcrypt/demos/test.c:23:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("\nder_test......"); fflush(stdout); x = der_tests();        printf(x ? "failed" : "passed");if (x) exit(EXIT_FAILURE);
data/dropbear-2020.81/libtomcrypt/demos/test.c:24:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("\nmac_test......"); fflush(stdout); x = mac_test();         printf(x ? "failed" : "passed");if (x) exit(EXIT_FAILURE);
data/dropbear-2020.81/libtomcrypt/demos/test.c:25:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("\npkcs_1_test..."); fflush(stdout); x = pkcs_1_test();      printf(x ? "failed" : "passed");if (x) exit(EXIT_FAILURE);
data/dropbear-2020.81/libtomcrypt/demos/test.c:26:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("\nrsa_test......"); fflush(stdout); x = rsa_test();         printf(x ? "failed" : "passed");if (x) exit(EXIT_FAILURE);
data/dropbear-2020.81/libtomcrypt/demos/test.c:27:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("\necc_test......"); fflush(stdout); x = ecc_tests();        printf(x ? "failed" : "passed");if (x) exit(EXIT_FAILURE); 
data/dropbear-2020.81/libtomcrypt/demos/test.c:28:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("\ndsa_test......"); fflush(stdout); x = dsa_test();         printf(x ? "failed" : "passed");if (x) exit(EXIT_FAILURE);
data/dropbear-2020.81/libtomcrypt/demos/test.c:29:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf("\nkatja_test...."); fflush(stdout); x = katja_test();       printf(x ? "failed" : "passed");if (x) exit(EXIT_FAILURE);
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_macros.h:441:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_macros.h:441:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:214:23:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define __ASN1_ERR(l) fprintf(stderr, __ASN1_FMTSTRING_FMT "\n", __ASN1_FMTSTRING_VAL(l)); \
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:251:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buf, sizeof(buf),__ASN1_FMTSTRING_FMT "\n", __ASN1_FMTSTRING_VAL(l));
data/dropbear-2020.81/scp.c:145:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(a->list[0], a->list);
data/dropbear-2020.81/scp.c:240:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(ssh_program, args.list);
data/dropbear-2020.81/scp.c:1166:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	(void) vfprintf(fp, fmt, ap);
data/dropbear-2020.81/scp.c:1173:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, fmt, ap);
data/dropbear-2020.81/scpmisc.c:227:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, args);
data/dropbear-2020.81/svr-agentfwd.c:241:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(path, sizeof(path), AGENTDIRPREFIX "%.8x", prefix);
data/dropbear-2020.81/svr-authpasswd.c:71:15:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
		testcrypt = crypt(password, passwdcrypt);
data/dropbear-2020.81/svr-runopts.c:44:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, "Dropbear server v%s https://matt.ucc.asn.au/dropbear/dropbear.html\n"
data/dropbear-2020.81/svr-session.c:221:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(exitmsg, sizeof(exitmsg), format, param);
data/dropbear-2020.81/svr-session.c:290:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(printbuf, sizeof(printbuf), format, param);
data/dropbear-2020.81/svr-x11fwd.c:186:13:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	authprog = popen(XAUTH_COMMAND, "w");
data/dropbear-2020.81/cli-agentfwd.c:64:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	agent_sock = getenv("SSH_AUTH_SOCK");
data/dropbear-2020.81/cli-agentfwd.c:235:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!getenv("SSH_AUTH_SOCK")) {
data/dropbear-2020.81/cli-auth.c:64:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (getenv(DROPBEAR_PASSWORD_ENV)) {
data/dropbear-2020.81/cli-auth.c:342:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	password = getenv(DROPBEAR_PASSWORD_ENV);
data/dropbear-2020.81/cli-authpasswd.c:40:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	askpass_prog = getenv("SSH_ASKPASS");
data/dropbear-2020.81/cli-authpasswd.c:42:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		((!isatty(STDIN_FILENO) && getenv("DISPLAY") )
data/dropbear-2020.81/cli-authpasswd.c:43:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		 	|| getenv("SSH_ASKPASS_ALWAYS"));
data/dropbear-2020.81/cli-authpasswd.c:57:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	helper = getenv("SSH_ASKPASS");
data/dropbear-2020.81/cli-chansession.c:286:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	term = getenv("TERM");
data/dropbear-2020.81/cli-kex.c:247:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	homedir = getenv("HOME");
data/dropbear-2020.81/dbutil.c:164:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DROPBEAR_DEBUG_NET_TIMESTAMP"))
data/dropbear-2020.81/dbutil.c:207:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		trace_env = getenv("DROPBEAR_TRACE2") ? 1 : 0;
data/dropbear-2020.81/fuzz-wrapfd.c:51:2:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	nrand48(rand_state);
data/dropbear-2020.81/fuzz-wrapfd.c:105:30:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (wrap_fds[fd].closein || erand48(rand_state) < CHANCE_CLOSE) {
data/dropbear-2020.81/fuzz-wrapfd.c:111:6:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (erand48(rand_state) < CHANCE_INTR) {
data/dropbear-2020.81/fuzz-wrapfd.c:120:14:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			maxread = nrand48(rand_state) % maxread + 1;
data/dropbear-2020.81/fuzz-wrapfd.c:128:12:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	maxread = nrand48(rand_state) % maxread + 1;
data/dropbear-2020.81/fuzz-wrapfd.c:155:31:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (wrap_fds[fd].closeout || erand48(rand_state) < CHANCE_CLOSE) {
data/dropbear-2020.81/fuzz-wrapfd.c:161:6:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (erand48(rand_state) < CHANCE_INTR) {
data/dropbear-2020.81/fuzz-wrapfd.c:166:9:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	return nrand48(rand_state) % (count+1);
data/dropbear-2020.81/fuzz-wrapfd.c:181:6:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (erand48(rand_state) < CHANCE_INTR) {
data/dropbear-2020.81/fuzz-wrapfd.c:187:25:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (readfds != NULL && erand48(rand_state) < CHANCE_READ1) {
data/dropbear-2020.81/fuzz-wrapfd.c:199:17:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			sel = fdlist[nrand48(rand_state) % nset];
data/dropbear-2020.81/fuzz-wrapfd.c:203:8:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			if (erand48(rand_state) < CHANCE_READ2) {
data/dropbear-2020.81/fuzz-wrapfd.c:204:18:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				sel = fdlist[nrand48(rand_state) % nset];
data/dropbear-2020.81/fuzz-wrapfd.c:214:26:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (writefds != NULL && erand48(rand_state) < CHANCE_WRITE1) {
data/dropbear-2020.81/fuzz-wrapfd.c:226:17:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			sel = fdlist[nrand48(rand_state) % nset];
data/dropbear-2020.81/fuzz-wrapfd.c:230:8:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			if (erand48(rand_state) < CHANCE_WRITE2) {
data/dropbear-2020.81/fuzz-wrapfd.c:231:18:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				sel = fdlist[nrand48(rand_state) % nset];
data/dropbear-2020.81/libtomcrypt/demos/openssl-enc.c:58:34:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#error Cannot compile this demo; random generator required
data/dropbear-2020.81/libtomcrypt/testprof/pkcs_1_test.c:21:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/dropbear-2020.81/libtomcrypt/tests/pkcs_1_test.c:35:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(LTC_TEST_RAND_SEED);
data/dropbear-2020.81/scp.c:329:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt(argc, argv, "dfl:prtvBCc:i:P:q1246S:o:F:")) != -1)
data/dropbear-2020.81/buffer.c:87:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ret->data, buf->data, buf->len);
data/dropbear-2020.81/buffer.c:214:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ret, src, len);
data/dropbear-2020.81/buffer.c:236:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf_getwriteptr(ret, len), buf_getptr(buf, len), len);
data/dropbear-2020.81/buffer.c:293:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf_getwriteptr(buf, len), bytes, len);
data/dropbear-2020.81/chachapoly.c:76:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char seqbuf[8], key[POLY1305_KEY_LEN], tag[POLY1305_TAG_LEN];
data/dropbear-2020.81/chachapoly.c:122:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char seqbuf[8], buf[4];
data/dropbear-2020.81/cli-authinteract.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[DROPBEAR_MAX_CLI_PASS];
data/dropbear-2020.81/cli-authinteract.c:44:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tty = fopen(_PATH_TTY, "r");
data/dropbear-2020.81/cli-authpasswd.c:52:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[DROPBEAR_MAX_CLI_PASS + 1];
data/dropbear-2020.81/cli-authpasswd.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[80];
data/dropbear-2020.81/cli-kex.c:226:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tty = fopen(_PATH_TTY, "r");
data/dropbear-2020.81/cli-kex.c:274:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		hostsfile = fopen(filename, "a+");
data/dropbear-2020.81/cli-kex.c:284:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					hostsfile = fopen(filename, "r");
data/dropbear-2020.81/cli-runopts.c:455:22:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		opts.recv_window = atol(recv_window_arg);
data/dropbear-2020.81/cli-session.c:276:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				devnull = open(DROPBEAR_PATH_DEVNULL, O_RDONLY);
data/dropbear-2020.81/cli-session.c:417:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exitmsg[150];
data/dropbear-2020.81/cli-session.c:418:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullmsg[300];
data/dropbear-2020.81/cli-session.c:455:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char printbuf[1024];
data/dropbear-2020.81/cli-tcpfwd.c:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char portstring[NI_MAXSERV];
data/dropbear-2020.81/common-algo.c:355:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			buf_putbytes(buf, (const unsigned char *) localalgos[i].name, len);
data/dropbear-2020.81/common-algo.c:416:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *remotenames[MAX_PROPOSED_ALGO];
data/dropbear-2020.81/common-algo.c:454:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *remotenames[MAX_PROPOSED_ALGO], *localnames[MAX_PROPOSED_ALGO];
data/dropbear-2020.81/common-algo.c:601:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(algos, new_algos, sizeof(*new_algos) * (n+1));
data/dropbear-2020.81/common-channel.c:863:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cbuf_writeptr(cbuf, buflen), 
data/dropbear-2020.81/common-kex.c:261:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char tmpout[MAX_HASH_SIZE];
data/dropbear-2020.81/common-kex.c:263:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&hs2, hs, sizeof(hash_state));
data/dropbear-2020.81/common-kex.c:267:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, tmpout, MIN(hash_desc->hashsize, outlen));
data/dropbear-2020.81/common-kex.c:273:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&hs2, hs, sizeof(hash_state));
data/dropbear-2020.81/common-kex.c:276:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&out[offset], tmpout, MIN(outlen - offset, hash_desc->hashsize));
data/dropbear-2020.81/common-kex.c:290:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char C2S_IV[MAX_IV_LEN];
data/dropbear-2020.81/common-kex.c:291:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char C2S_key[MAX_KEY_LEN];
data/dropbear-2020.81/common-kex.c:292:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char S2C_IV[MAX_IV_LEN];
data/dropbear-2020.81/common-kex.c:293:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char S2C_key[MAX_KEY_LEN];
data/dropbear-2020.81/common-kex.c:727:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char basepoint[32] = {9};
data/dropbear-2020.81/common-kex.c:742:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char out[CURVE25519_LEN];
data/dropbear-2020.81/common-kex.c:745:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char zeroes[CURVE25519_LEN] = {0};
data/dropbear-2020.81/common-session.c:369:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[256];
data/dropbear-2020.81/common-session.c:398:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ses.remoteident, linebuf, len);
data/dropbear-2020.81/compat.c:177:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!noclose && (fd = open(DROPBEAR_PATH_DEVNULL, O_RDWR, 0)) != -1) {
data/dropbear-2020.81/compat.c:247:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen("/etc/shells", "rc")) == NULL)
data/dropbear-2020.81/dbmalloc.c:21:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ret, str, len+1);
data/dropbear-2020.81/dbrandom.c:37:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char hashpool[SHA1_HASH_SIZE] = {0};
data/dropbear-2020.81/dbrandom.c:65:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		readfd = open(filename, O_RDONLY);
data/dropbear-2020.81/dbrandom.c:75:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char readbuf[4096];
data/dropbear-2020.81/dbrandom.c:84:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char egdcmd[2];
data/dropbear-2020.81/dbrandom.c:141:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[INIT_SEED_SIZE];
data/dropbear-2020.81/dbrandom.c:142:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(DROPBEAR_URANDOM_DEV, "w");
data/dropbear-2020.81/dbrandom.c:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[INIT_SEED_SIZE];
data/dropbear-2020.81/dbrandom.c:320:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[SHA1_HASH_SIZE];
data/dropbear-2020.81/dbrandom.c:339:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, hash, copylen);
data/dropbear-2020.81/dbutil.c:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fmtbuf[300];
data/dropbear-2020.81/dbutil.c:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char printbuf[1024];
data/dropbear-2020.81/dbutil.c:278:8:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
	pid = vfork();
data/dropbear-2020.81/dbutil.c:348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char * argv[4];
data/dropbear-2020.81/dbutil.c:450:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_RDONLY);
data/dropbear-2020.81/dbutil.c:680:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int dirfd = open(dir, O_RDONLY);
data/dropbear-2020.81/dh_groups.c:8:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char dh_p_1[DH_P_1_LEN] = {
data/dropbear-2020.81/dh_groups.c:24:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char dh_p_14[DH_P_14_LEN] = {
data/dropbear-2020.81/dh_groups.c:51:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char dh_p_16[DH_P_16_LEN] = {
data/dropbear-2020.81/dh_groups.h:9:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char dh_p_1[DH_P_1_LEN];
data/dropbear-2020.81/dh_groups.h:14:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char dh_p_14[DH_P_14_LEN];
data/dropbear-2020.81/dh_groups.h:19:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char dh_p_16[DH_P_16_LEN];
data/dropbear-2020.81/dropbearkey.c:325:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char base64key[MAX_PUBKEY_SIZE*2];
data/dropbear-2020.81/dropbearkey.c:333:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[100];
data/dropbear-2020.81/dss.c:166:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msghash[SHA1_HASH_SIZE];
data/dropbear-2020.81/dss.c:284:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msghash[SHA1_HASH_SIZE];
data/dropbear-2020.81/ecdsa.c:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key_ident[30];
data/dropbear-2020.81/ecdsa.c:161:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[64];
data/dropbear-2020.81/ecdsa.c:163:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key_ident[30];
data/dropbear-2020.81/ecdsa.c:279:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[64];
data/dropbear-2020.81/ed25519.c:57:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key->pub, buf_getptr(buf, CURVE25519_LEN), CURVE25519_LEN);
data/dropbear-2020.81/ed25519.c:82:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key->priv, buf_getptr(buf, CURVE25519_LEN), CURVE25519_LEN);
data/dropbear-2020.81/ed25519.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key->pub, buf_getptr(buf, CURVE25519_LEN), CURVE25519_LEN);
data/dropbear-2020.81/ed25519.c:136:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char s[64];
data/dropbear-2020.81/ed25519.h:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char priv[CURVE25519_LEN];
data/dropbear-2020.81/ed25519.h:38:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char pub[CURVE25519_LEN];
data/dropbear-2020.81/fake-rfc2553.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpserv[16];
data/dropbear-2020.81/fake-rfc2553.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		__ss_pad2[_SS_PADSIZE];
data/dropbear-2020.81/fuzz-common.c:53:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char printbuf[1024];
data/dropbear-2020.81/fuzz-wrapfd.c:50:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rand_state, &seed, sizeof(seed));
data/dropbear-2020.81/fuzz-wrapfd.c:56:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		devnull_fd = open("/dev/null", O_RDONLY);
data/dropbear-2020.81/fuzz-wrapfd.c:122:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out, buf_getptr(input_buf, maxread), maxread);
data/dropbear-2020.81/gcm.c:48:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(state->iv, IV, GCM_NONCE_LEN);
data/dropbear-2020.81/gcm.c:58:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char *iv, tag[GHASH_LEN];
data/dropbear-2020.81/gcm.h:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char iv[GCM_NONCE_LEN];
data/dropbear-2020.81/gendss.c:70:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[QSIZE];
data/dropbear-2020.81/gensignkey.c:16:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_RDWR | O_CREAT | O_EXCL, S_IRUSR | S_IWUSR);
data/dropbear-2020.81/kex.h:108:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char priv[CURVE25519_LEN];
data/dropbear-2020.81/kex.h:109:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char pub[CURVE25519_LEN];
data/dropbear-2020.81/keyimport.c:172:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(filename, "w");
data/dropbear-2020.81/keyimport.c:212:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char out[100];
data/dropbear-2020.81/keyimport.c:371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char iv[32];
data/dropbear-2020.81/keyimport.c:381:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[256];
data/dropbear-2020.81/keyimport.c:395:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen(filename, "r");
data/dropbear-2020.81/keyimport.c:583:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char keybuf[32];
data/dropbear-2020.81/keyimport.c:926:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char zero[1];
data/dropbear-2020.81/keyimport.c:1119:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(outblob+pos, numbers[i].start, numbers[i].bytes);
data/dropbear-2020.81/keyimport.c:1207:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&outblob[pos], seq_buf->data, seq_buf->len);
data/dropbear-2020.81/keyimport.c:1255:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(outblob, buf->data, buf->len);
data/dropbear-2020.81/keyimport.c:1303:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen(filename, "wb");	  /* ensure Unix line endings */
data/dropbear-2020.81/keyimport.c:1411:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char comment[256];				 /* allowing any length is overkill */
data/dropbear-2020.81/keyimport.c:1420:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[256];
data/dropbear-2020.81/keyimport.c:1424:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char base64_bit[4];
data/dropbear-2020.81/keyimport.c:1432:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(filename, "r");
data/dropbear-2020.81/keyimport.c:1490:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					unsigned char out[3];
data/dropbear-2020.81/keyimport.c:1507:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(ret->keyblob + ret->keyblob_len, out, len);
data/dropbear-2020.81/keyimport.c:1613:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(d+4, i, len);
data/dropbear-2020.81/keyimport.c:1711:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char keybuf[32], iv[8];
data/dropbear-2020.81/keyimport.c:1989:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char keybuf[32], iv[8];
data/dropbear-2020.81/keyimport.c:2015:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(filename, "wb");	  /* ensure Unix line endings */
data/dropbear-2020.81/libtomcrypt/demos/encrypt.c:97:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char plaintext[512],ciphertext[512];
data/dropbear-2020.81/libtomcrypt/demos/encrypt.c:98:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmpkey[512], key[MAXBLOCKSIZE], IV[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/demos/encrypt.c:99:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char inbuf[512]; /* i/o block size */
data/dropbear-2020.81/libtomcrypt/demos/encrypt.c:127:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fdin = fopen(infile,"rb");
data/dropbear-2020.81/libtomcrypt/demos/encrypt.c:133:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fdout = fopen(outfile,"wb");
data/dropbear-2020.81/libtomcrypt/demos/hashsum.c:77:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char is_buffer[MAXBLOCKSIZE], should_buffer[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/demos/hashsum.c:78:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX + (MAXBLOCKSIZE * 3)];
data/dropbear-2020.81/libtomcrypt/demos/hashsum.c:82:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE* f = fopen(argv[argn], "rb");
data/dropbear-2020.81/libtomcrypt/demos/hashsum.c:179:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char hash_buffer[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/demos/ltcrypt.c:36:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char plaintext[512],ciphertext[512];
data/dropbear-2020.81/libtomcrypt/demos/ltcrypt.c:37:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmpkey[512], key[MAXBLOCKSIZE], IV[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/demos/ltcrypt.c:38:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char inbuf[512]; /* i/o block size */
data/dropbear-2020.81/libtomcrypt/demos/ltcrypt.c:90:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fdin = fopen(infile,"rb");
data/dropbear-2020.81/libtomcrypt/demos/ltcrypt.c:96:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fdout = fopen(outfile,"wb");
data/dropbear-2020.81/libtomcrypt/demos/multi.c:6:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[16], buf[2][MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/demos/openssl-enc.c:81:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char unpad[1024];
data/dropbear-2020.81/libtomcrypt/demos/openssl-enc.c:82:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char pad[1024+MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/demos/openssl-enc.c:141:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[SALT_LENGTH];
data/dropbear-2020.81/libtomcrypt/demos/openssl-enc.c:148:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(out, tmp, sizeof(tmp));
data/dropbear-2020.81/libtomcrypt/demos/openssl-enc.c:308:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char salt[SALT_LENGTH];
data/dropbear-2020.81/libtomcrypt/demos/openssl-enc.c:313:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char keyiv[KEY_LENGTH + IV_LENGTH];
data/dropbear-2020.81/libtomcrypt/demos/openssl-enc.c:330:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   infd = fopen(argv[2], "rb");
data/dropbear-2020.81/libtomcrypt/demos/openssl-enc.c:333:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   outfd = fopen(argv[3], "wb");
data/dropbear-2020.81/libtomcrypt/demos/timing.c:151:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/demos/timing.c:184:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[MAXBLOCKSIZE] = { 0 }, pt[4096] = { 0 };
data/dropbear-2020.81/libtomcrypt/demos/timing.c:257:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[MAXBLOCKSIZE] = { 0 }, pt[4096] = { 0 };
data/dropbear-2020.81/libtomcrypt/demos/timing.c:330:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[MAXBLOCKSIZE] = { 0 }, pt[4096] = { 0 };
data/dropbear-2020.81/libtomcrypt/demos/timing.c:403:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[MAXBLOCKSIZE] = { 0 }, pt[4096] = { 0 };
data/dropbear-2020.81/libtomcrypt/demos/timing.c:479:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char pt[MAXBLOCKSIZE] = { 0 };
data/dropbear-2020.81/libtomcrypt/demos/timing.c:599:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[4096];
data/dropbear-2020.81/libtomcrypt/demos/timing.c:709:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][2048] = { 0 };
data/dropbear-2020.81/libtomcrypt/demos/timing.c:833:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][4096];
data/dropbear-2020.81/libtomcrypt/demos/timing.c:945:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][256] = { 0 };
data/dropbear-2020.81/libtomcrypt/demos/timing.c:1091:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char *buf, key[16], tag[16];
data/dropbear-2020.81/libtomcrypt/demos/timing.c:1228:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char *buf, IV[16], key[16], tag[16];
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:13:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char md[MAXBLOCKSIZE], *buf;
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:18:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("hash_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:54:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char *key, pt[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:60:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("cipher_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:129:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[MAXBLOCKSIZE], output[MAXBLOCKSIZE], *input;
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:134:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("hmac_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:171:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(key, output, hash_descriptor[x].hashsize);
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:182:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[MAXBLOCKSIZE], output[MAXBLOCKSIZE], input[MAXBLOCKSIZE*2+2];
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:187:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("omac_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:239:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[MAXBLOCKSIZE], output[MAXBLOCKSIZE], input[MAXBLOCKSIZE*2+2];
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:244:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("pmac_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:298:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[MAXBLOCKSIZE], nonce[MAXBLOCKSIZE*2], header[MAXBLOCKSIZE*2],
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:302:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("eax_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:360:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[MAXBLOCKSIZE], nonce[MAXBLOCKSIZE*2],
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:364:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("ocb_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:425:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[MAXBLOCKSIZE], nonce[MAXBLOCKSIZE*2],
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:429:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("ocb3_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:491:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[MAXBLOCKSIZE], nonce[MAXBLOCKSIZE*2],
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:495:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("ccm_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:560:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[MAXBLOCKSIZE], plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:563:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("gcm_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:621:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char dst[256], src[32], ch;
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:624:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("base64_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:644:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char str[512];
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:649:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("ecc_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:661:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        mp_read_radix(order,   (char *)ltc_ecc_sets[x].order, 16);
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:662:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        mp_read_radix(modulus, (char *)ltc_ecc_sets[x].prime, 16);
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:663:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        mp_read_radix(G->x,    (char *)ltc_ecc_sets[x].Gx,    16);
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:664:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        mp_read_radix(G->y,    (char *)ltc_ecc_sets[x].Gy,    16);
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:685:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tweak[16], key[16], iv[16], buf[1024];
data/dropbear-2020.81/libtomcrypt/demos/tv_gen.c:694:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen("lrw_tv.txt", "w");
data/dropbear-2020.81/libtomcrypt/notes/etc/whirltest.c:5:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c:8:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char n[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c:10:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char e[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c:12:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char d[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c:14:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char p[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c:16:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char q[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c:18:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char dP[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c:20:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char dQ[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c:22:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char qInv[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c:28:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char o1[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c:30:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char o2[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/oaep-vect.c:32:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char o3[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c:8:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char n[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c:10:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char e[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c:12:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char d[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c:14:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char p[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c:16:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char q[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c:18:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char dP[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c:20:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char dQ[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c:22:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char qInv[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c:28:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char o1[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c:30:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char o2[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15crypt-vectors.c:32:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char o3[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15sign-vectors.c:8:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char n[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15sign-vectors.c:10:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char e[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15sign-vectors.c:12:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char d[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15sign-vectors.c:14:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char p[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15sign-vectors.c:16:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char q[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15sign-vectors.c:18:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char dP[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15sign-vectors.c:20:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char dQ[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15sign-vectors.c:22:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char qInv[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15sign-vectors.c:28:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char o1[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pkcs1v15sign-vectors.c:30:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char o2[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c:8:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char n[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c:10:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char e[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c:12:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char d[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c:14:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char p[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c:16:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char q[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c:18:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char dP[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c:20:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char dQ[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c:22:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char qInv[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c:28:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char o1[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c:30:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char o2[256];
data/dropbear-2020.81/libtomcrypt/notes/rsa-testvectors/pss-vect.c:32:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char o3[256];
data/dropbear-2020.81/libtomcrypt/src/ciphers/aes/aes.c:647:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char key[32], pt[16], ct[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/aes/aes.c:679:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[2][16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/anubis.c:1037:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void anubis_crypt(const unsigned char *plaintext, unsigned char *ciphertext,
data/dropbear-2020.81/libtomcrypt/src/ciphers/anubis.c:1037:67:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void anubis_crypt(const unsigned char *plaintext, unsigned char *ciphertext,
data/dropbear-2020.81/libtomcrypt/src/ciphers/anubis.c:1173:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char pt[16], ct[16], key[40];
data/dropbear-2020.81/libtomcrypt/src/ciphers/anubis.c:1494:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/blowfish.c:310:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char B[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/blowfish.c:517:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          unsigned char key[8], pt[8], ct[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/blowfish.c:535:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[2][8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/camellia.c:210:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char T[48], kA[16], kB[16], kR[16], kL[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/camellia.c:632:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char key[32], pt[16], ct[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/camellia.c:681:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/cast5.c:413:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/cast5.c:647:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char key[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/cast5.c:648:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char pt[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/cast5.c:649:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char ct[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/cast5.c:669:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[2][8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/des.c:68:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char pc1[56] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/des.c:75:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char totrot[16] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/des.c:82:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char pc2[48] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/des.c:1310:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pc1m[56], pcr[56];
data/dropbear-2020.81/libtomcrypt/src/ciphers/des.c:1696:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char key[8], txt[8], out[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/des.c:1973:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/des.c:2008:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[24], pt[8], ct[8], tmp[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/kasumi.c:257:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char key[16], pt[8], ct[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/kasumi.c:291:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/khazad.c:779:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char pt[8], ct[8], key[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/khazad.c:804:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/kseed.c:312:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char pt[16], ct[16], key[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/kseed.c:340:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/multi2.c:193:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char key[40];
data/dropbear-2020.81/libtomcrypt/src/ciphers/multi2.c:194:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char pt[8], ct[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/multi2.c:247:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/multi2.c:272:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char ct[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/noekeon.c:221:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char key[16], pt[16], ct[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/noekeon.c:273:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char tmp[2][16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/rc2.c:41:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char permute[256] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/rc2.c:72:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[128];
data/dropbear-2020.81/libtomcrypt/src/ciphers/rc2.c:305:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char key[16], pt[8], ct[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/rc2.c:353:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[2][8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/rc5.c:240:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char key[16], pt[8], ct[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/rc5.c:261:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[2][8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/rc6.c:235:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char key[32], pt[16], ct[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/rc6.c:271:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[2][16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/safer.c:113:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ka[LTC_SAFER_BLOCK_LEN + 1];
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/safer.c:114:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char kb[LTC_SAFER_BLOCK_LEN + 1];
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/safer.c:388:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/safer.c:418:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/safer.c:463:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/safer_tab.c:19:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char safer_ebox[256] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/safer_tab.c:39:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char safer_lbox[256] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/saferp.c:181:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char safer_bias[33][16] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/saferp.c:226:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char t[33];
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/saferp.c:343:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char b[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/saferp.c:407:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char b[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/saferp.c:473:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char key[32], pt[16], ct[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/safer/saferp.c:505:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[2][16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/skipjack.c:32:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char sbox[256] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/skipjack.c:276:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char key[10], pt[8], ct[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/skipjack.c:284:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/twofish/twofish.c:44:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char RS[4][8] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/twofish/twofish.c:53:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char qord[4][5] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/twofish/twofish.c:71:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char qbox[2][4][16] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/twofish/twofish.c:243:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char y[4];
data/dropbear-2020.81/libtomcrypt/src/ciphers/twofish/twofish.c:346:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char S[4*4], tmpx0, tmpx1;
data/dropbear-2020.81/libtomcrypt/src/ciphers/twofish/twofish.c:349:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[4], tmp2[4], M[8*4];
data/dropbear-2020.81/libtomcrypt/src/ciphers/twofish/twofish.c:618:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char key[32], pt[16], ct[16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/twofish/twofish.c:651:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[2][16];
data/dropbear-2020.81/libtomcrypt/src/ciphers/twofish/twofish_tab.c:18:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char SBOX[2][256] = {
data/dropbear-2020.81/libtomcrypt/src/ciphers/xtea.c:149:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char key[16], pt[8], ct[8];
data/dropbear-2020.81/libtomcrypt/src/ciphers/xtea.c:203:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[2][8];
data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_memory.c:49:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char  PAD[16], ctr[16], CTRPAD[16], ptTag[16], b, *pt_real;
data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_test.c:24:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char key[16];
data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_test.c:25:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char nonce[16];
data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_test.c:27:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char header[64];
data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_test.c:29:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char pt[64];
data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_test.c:31:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char ct[64];
data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_test.c:32:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char tag[16];
data/dropbear-2020.81/libtomcrypt/src/encauth/ccm/ccm_test.c:115:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[64], buf2[64], tag[16], tag2[16], tag3[16], zero[64];
data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_decrypt.c:24:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char padzero[16] = { 0 };
data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_done.c:23:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char padzero[16] = { 0 };
data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_done.c:25:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[16];
data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_encrypt.c:24:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char padzero[16] = { 0 };
data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_setiv.c:25:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char polykey[32];
data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_setiv_rfc7905.c:25:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char combined_iv[12] = { 0 };
data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_test.c:39:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char ct[1000], pt[1000], emac[16], dmac[16];
data/dropbear-2020.81/libtomcrypt/src/encauth/eax/eax_test.c:33:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char        key[MAXBLOCKSIZE],
data/dropbear-2020.81/libtomcrypt/src/encauth/eax/eax_test.c:216:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char outct[MAXBLOCKSIZE], outtag[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_gf_mult.c:20:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char gcm_shift_table[256*2] = {
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_gf_mult.c:83:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char Z[16], V[16];
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_gf_mult.c:119:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char pTmp[32];
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_init.c:30:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char B[16];
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_mult_h.c:24:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char T[16];
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_test.c:28:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char K[32];
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_test.c:30:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char P[128];
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_test.c:32:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char A[128];
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_test.c:34:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char IV[128];
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_test.c:36:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char C[128];
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_test.c:37:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char T[16];
data/dropbear-2020.81/libtomcrypt/src/encauth/gcm/gcm_test.c:327:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char out[2][128], T[2][16];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_decrypt.c:27:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char Z[MAXBLOCKSIZE], tmp[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_encrypt.c:27:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char Z[MAXBLOCKSIZE], tmp[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_init.c:20:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char poly_div[MAXBLOCKSIZE],
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_test.c:29:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         unsigned char key[16], nonce[16], pt[34], ct[34], tag[16];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb/ocb_test.c:167:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char outct[MAXBLOCKSIZE], outtag[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_add_aad.c:26:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_decrypt.c:28:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_decrypt_last.c:28:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iOffset_star[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_decrypt_last.c:29:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iPad[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_done.c:27:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_encrypt.c:28:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_encrypt_last.c:28:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iOffset_star[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_encrypt_last.c:29:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iPad[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_init.c:22:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iNonce[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_init.c:23:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iKtop[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_init.c:24:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iStretch[MAXBLOCKSIZE+8];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_init.c:65:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char poly_mul[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_test.c:28:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[16]   = { 0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07,0x08,0x09,0x0A,0x0B,0x0C,0x0D,0x0E,0x0F };
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_test.c:29:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char nonce[12] = { 0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07,0x08,0x09,0x0A,0x0B };
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_test.c:33:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         unsigned char pt[64], aad[64], ct[64], tag[16];
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_test.c:207:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char outct[MAXBLOCKSIZE]  = { 0 };
data/dropbear-2020.81/libtomcrypt/src/encauth/ocb3/ocb3_test.c:208:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char outtag[MAXBLOCKSIZE] = { 0 };
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:140:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char blake2b_sigma[12][16] =
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:204:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char P[BLAKE2B_PARAM_SIZE];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:226:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char block[BLAKE2B_BLOCKBYTES];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:365:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buffer[BLAKE2B_OUTBYTES] = { 0 };
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:403:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[64];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:428:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[64];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:433:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      blake2b_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:454:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[48];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:475:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[48];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:480:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      blake2b_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:501:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[32];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:528:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[32];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:533:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      blake2b_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:554:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[20];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:569:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[20];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:574:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      blake2b_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:135:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char blake2s_sigma[10][16] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:198:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char P[BLAKE2S_PARAM_SIZE];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:220:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char block[BLAKE2S_BLOCKBYTES];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:353:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buffer[BLAKE2S_OUTBYTES] = { 0 };
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:391:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[32];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:418:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[32];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:423:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      blake2s_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:445:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[28];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:462:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[28];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:467:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      blake2s_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:489:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[20];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:504:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[20];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:509:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      blake2s_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:531:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[16];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:544:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[16];
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:549:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      blake2s_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/chc/chc.c:88:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char  buf[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/hashes/chc/chc.c:132:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char  T[2][MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/hashes/chc/chc.c:262:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char *msg,
data/dropbear-2020.81/libtomcrypt/src/hashes/chc/chc.c:274:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/hashes/chc/chc.c:288:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       chc_process(&md, tests[i].msg, strlen((char *)tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/helper/hash_file.c:36:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    in = fopen(fname, "rb");
data/dropbear-2020.81/libtomcrypt/src/hashes/md2.c:36:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char PI_SUBST[256] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/md2.c:195:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char hash[16];
data/dropbear-2020.81/libtomcrypt/src/hashes/md2.c:230:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[16];
data/dropbear-2020.81/libtomcrypt/src/hashes/md4.c:258:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char hash[16];
data/dropbear-2020.81/libtomcrypt/src/hashes/md4.c:284:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[16];
data/dropbear-2020.81/libtomcrypt/src/hashes/md4.c:289:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        md4_process(&md, (unsigned char *)tests[i].input, (unsigned long)strlen(tests[i].input));
data/dropbear-2020.81/libtomcrypt/src/hashes/md5.c:56:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char Worder[64] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/md5.c:63:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char Rorder[64] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/md5.c:318:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[16];
data/dropbear-2020.81/libtomcrypt/src/hashes/md5.c:345:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[16];
data/dropbear-2020.81/libtomcrypt/src/hashes/md5.c:350:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      md5_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd128.c:357:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char hash[16];
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd128.c:386:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[16];
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd128.c:391:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       rmd128_process(&md, (unsigned char *)tests[i].msg, strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd160.c:416:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char hash[20];
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd160.c:445:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[20];
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd160.c:450:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       rmd160_process(&md, (unsigned char *)tests[i].msg, strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd256.c:370:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char hash[32];
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd256.c:411:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[32];
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd256.c:416:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       rmd256_process(&md, (unsigned char *)tests[i].msg, strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd320.c:435:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char hash[40];
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd320.c:476:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[40];
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd320.c:481:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       rmd320_process(&md, (unsigned char *)tests[i].msg, strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/sha1.c:250:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[20];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha1.c:265:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[20];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha224.c:67:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[32];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha224.c:92:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[28];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha224.c:109:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[28];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha256.c:296:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[32];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha256.c:313:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[32];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha384.c:66:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha384.c:94:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[48];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha384.c:115:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[48];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512.c:266:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[64];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512.c:291:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[64];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512.c:296:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      sha512_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512_224.c:66:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512_224.c:94:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[28];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512_224.c:111:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[28];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512_256.c:66:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512_256.c:94:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[32];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512_256.c:111:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[32];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:21:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[200], hash[224 / 8];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:26:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const unsigned char sha3_224_empty[224 / 8] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:33:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const unsigned char sha3_224_0xa3_200_times[224 / 8] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:78:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[200], hash[256 / 8];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:83:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const unsigned char sha3_256_empty[256 / 8] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:89:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const unsigned char sha3_256_0xa3_200_times[256 / 8] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:172:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[200], hash[384 / 8];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:177:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const unsigned char sha3_384_0xa3_200_times[384 / 8] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:225:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[200], hash[512 / 8];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:230:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const unsigned char sha3_512_0xa3_200_times[512 / 8] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:280:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[200], hash[512];
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:286:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const unsigned char shake256_empty[32] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:292:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const unsigned char shake256_0xa3_200_times[32] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:298:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const unsigned char shake128_empty[32] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/sha3_test.c:304:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const unsigned char shake128_0xa3_200_times[32] = {
data/dropbear-2020.81/libtomcrypt/src/hashes/tiger.c:739:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char hash[24];
data/dropbear-2020.81/libtomcrypt/src/hashes/tiger.c:769:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[24];
data/dropbear-2020.81/libtomcrypt/src/hashes/tiger.c:774:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      tiger_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/whirl/whirl.c:208:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char msg[128], hash[64];
data/dropbear-2020.81/libtomcrypt/src/hashes/whirl/whirl.c:285:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[64];
data/dropbear-2020.81/libtomcrypt/src/hashes/whirl/whirl.c:290:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      whirlpool_process(&md, (unsigned char *)tests[i].msg, tests[i].len);
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:37:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char K[33][16];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:77:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char S[32], start;
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:90:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char safer_block_t[LTC_SAFER_BLOCK_LEN];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:91:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char safer_key_t[LTC_SAFER_KEY_LEN];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:123:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[10];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:241:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char       IV[MAXBLOCKSIZE],
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:259:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char       IV[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:273:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char       IV[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:295:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char       ctr[MAXBLOCKSIZE],
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:311:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     IV[16],
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:324:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     PC[16][256][16];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:339:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char       IV[MAXBLOCKSIZE],
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:956:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char kstream[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_cipher.h:976:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[256];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_custom.h:39:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define XMEMCPY  memcpy
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_custom.h:66:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      defined(memset) || defined(memcpy) || defined(memcmp) || defined(strcmp) || \
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:15:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sb[25 * 8];       /* used for storing `ulong64 s[25]` as little-endian bytes */
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:27:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[128];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:35:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:43:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:51:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:59:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:67:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:73:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char chksum[16], X[48], buf[16];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:81:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:89:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:97:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:105:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:113:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:121:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char state[MAXBLOCKSIZE], buf[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:131:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:143:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[128];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_hash.h:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dummy[1];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:41:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char   block[MAXBLOCKSIZE],
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:68:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char     Ls[32][MAXBLOCKSIZE],    /* L shifted by i bits to the left */
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:114:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buffer[16];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:156:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char N[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:192:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char     L[MAXBLOCKSIZE],         /* L value */
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:248:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char     Offset_0[MAXBLOCKSIZE],       /* Offset_0 value */
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:257:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char     aSum_current[MAXBLOCKSIZE],    /* AAD related helper variable */
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:327:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char       PAD[16],
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:387:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char       H[16],        /* multiplier */
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:402:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char       PC[16][256][16]  /* 16 tables of 8x128 */
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:448:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char state[16];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:469:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char K[3][MAXBLOCKSIZE],
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_mac.h:501:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char akey[MAXBLOCKSIZE],
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_prng.h:14:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char         pool[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_prng.h:28:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ent[40]; /* entropy buffer */
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_prng.h:39:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char K[32],      /* the current key */
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_prng.h:53:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ent[40]; /* entropy buffer */
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_prng.h:60:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char dummy[1];
data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2bmac_file.c:52:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   in = fopen(fname, "rb");
data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2bmac_test.c:19:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char tests[256][64] = {
data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2bmac_test.c:278:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char inp[1000], out[1000];
data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2smac_file.c:52:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   in = fopen(fname, "rb");
data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2smac_test.c:19:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char tests[256][32] = {
data/dropbear-2020.81/libtomcrypt/src/mac/blake2/blake2smac_test.c:278:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char inp[1000], out[1000];
data/dropbear-2020.81/libtomcrypt/src/mac/f9/f9_file.c:61:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   in = fopen(fname, "rb");
data/dropbear-2020.81/libtomcrypt/src/mac/f9/f9_test.c:28:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char K[16], M[128], T[4];
data/dropbear-2020.81/libtomcrypt/src/mac/f9/f9_test.c:48:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char T[16];
data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_done.c:29:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[MAXBLOCKSIZE], isha[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_file.c:64:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   in = fopen(fname, "rb");
data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_init.c:30:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_test.c:58:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/mac/hmac/hmac_test.c:151:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char digest[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/mac/omac/omac_file.c:61:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   in = fopen(filename, "rb");
data/dropbear-2020.81/libtomcrypt/src/mac/omac/omac_test.c:29:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char key[16], msg[64], tag[16];
data/dropbear-2020.81/libtomcrypt/src/mac/omac/omac_test.c:73:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char out[16];
data/dropbear-2020.81/libtomcrypt/src/mac/pelican/pelican_test.c:24:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char K[32], MSG[64], T[16];
data/dropbear-2020.81/libtomcrypt/src/mac/pelican/pelican_test.c:86:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char out[16];
data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_file.c:62:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   in = fopen(filename, "rb");
data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_init.c:20:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char poly_div[MAXBLOCKSIZE],
data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_process.c:30:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char Z[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_test.c:30:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char key[16], msg[34], tag[16];
data/dropbear-2020.81/libtomcrypt/src/mac/pmac/pmac_test.c:124:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char outtag[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/mac/poly1305/poly1305_file.c:57:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   in = fopen(fname, "rb");
data/dropbear-2020.81/libtomcrypt/src/mac/poly1305/poly1305_test.c:29:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char out[1000];
data/dropbear-2020.81/libtomcrypt/src/mac/xcbc/xcbc_file.c:61:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   in = fopen(filename, "rb");
data/dropbear-2020.81/libtomcrypt/src/mac/xcbc/xcbc_test.c:28:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       unsigned char K[16], M[34], T[16];
data/dropbear-2020.81/libtomcrypt/src/mac/xcbc/xcbc_test.c:96:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char T[16];
data/dropbear-2020.81/libtomcrypt/src/math/fp/ltc_ecc_fp_mulmod.c:780:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char kb[128];
data/dropbear-2020.81/libtomcrypt/src/math/fp/ltc_ecc_fp_mulmod.c:905:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char kb[2][128];
data/dropbear-2020.81/libtomcrypt/src/misc/adler32.c:116:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char out[4];
data/dropbear-2020.81/libtomcrypt/src/misc/base64/base64_decode.c:21:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char map_base64[256] = {
data/dropbear-2020.81/libtomcrypt/src/misc/burn_stack.c:22:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[32];
data/dropbear-2020.81/libtomcrypt/src/misc/crc32.c:187:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char out[4];
data/dropbear-2020.81/libtomcrypt/src/misc/hkdf/hkdf_test.c:38:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char OKM[82];
data/dropbear-2020.81/libtomcrypt/src/misc/hkdf/hkdf_test.c:44:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char IKM[80];
data/dropbear-2020.81/libtomcrypt/src/misc/hkdf/hkdf_test.c:46:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char salt[80];
data/dropbear-2020.81/libtomcrypt/src/misc/hkdf/hkdf_test.c:48:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char info[80];
data/dropbear-2020.81/libtomcrypt/src/misc/hkdf/hkdf_test.c:50:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char PRK[32];
data/dropbear-2020.81/libtomcrypt/src/misc/hkdf/hkdf_test.c:52:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char OKM[82];
data/dropbear-2020.81/libtomcrypt/src/misc/pkcs5/pkcs_5_2.c:37:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char *buf[2];
data/dropbear-2020.81/libtomcrypt/src/misc/pkcs5/pkcs_5_test.c:44:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char DK[40];
data/dropbear-2020.81/libtomcrypt/src/misc/pkcs5/pkcs_5_test.c:157:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char DK[40];
data/dropbear-2020.81/libtomcrypt/src/modes/cbc/cbc_decrypt.c:30:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[16];
data/dropbear-2020.81/libtomcrypt/src/modes/ctr/ctr_test.c:25:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char key[32], IV[16], pt[64], ct[64];
data/dropbear-2020.81/libtomcrypt/src/modes/ctr/ctr_test.c:50:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_encrypt.c:29:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_start.c:37:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tkey[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_test_mode.c:24:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char key[16] = { 0x23, 0x48, 0x29, 0x00, 0x84, 0x67, 0xbe, 0x18,
data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_test_mode.c:26:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char salt[4] = { 0x32, 0xf2, 0x87, 0x0d };
data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_test_mode.c:27:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char IV[16]  = { 0x00, 0x6e, 0x5c, 0xba, 0x50, 0x68, 0x1d, 0xe5,
data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_test_mode.c:29:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char pt[39]  = { 0x70, 0x73, 0x65, 0x75, 0x64, 0x6f, 0x72, 0x61,
data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_test_mode.c:34:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char ct[39]  = { 0x01, 0x9c, 0xe7, 0xa2, 0x6e, 0x78, 0x54, 0x01,
data/dropbear-2020.81/libtomcrypt/src/modes/f8/f8_test_mode.c:39:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[39];
data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_process.c:29:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char prod[16];
data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_setiv.c:29:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char T[16];
data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_start.c:38:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char B[16];
data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_test.c:28:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char key[16], tweak[16], IV[16], P[16], expected_tweak[16], C[16];
data/dropbear-2020.81/libtomcrypt/src/modes/lrw/lrw_test.c:72:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[2][16];
data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_decrypt.c:62:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char PP[16], CC[16], T[16];
data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_encrypt.c:64:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char PP[16], CC[16], T[16];
data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_test.c:82:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char key1[32];
data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_test.c:83:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char key2[32];
data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_test.c:86:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char PTX[512], CTX[512];
data/dropbear-2020.81/libtomcrypt/src/modes/xts/xts_test.c:201:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char OUT[512], Torg[16], T[16];
data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/generalizedtime/der_decode_generalizedtime.c:58:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[32];
data/dropbear-2020.81/libtomcrypt/src/pk/asn1/der/utctime/der_decode_utctime.c:50:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[32] = { 0 }; /* initialize as all zeroes */
data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_export.c:24:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char flags[1];
data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_import.c:23:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char flags[1];
data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_export.c:59:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          unsigned char flags[1];
data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_export.c:98:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          unsigned char flags[1];
data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_generate_pqg.c:33:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char *wbuf, *sbuf, digest[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_import.c:30:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char flags[1];
data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_ansi_x963_export.c:32:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[ECC_BUF_SIZE];
data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_export.c:35:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char flags[1];
data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_import.c:95:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char flags[1];
data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_sign_hash.c:27:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char ch, buf[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_test.c:51:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       if ((err = mp_read_radix(modulus, (char *)ltc_ecc_sets[i].prime, 16)) != CRYPT_OK)   { goto done; }
data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_test.c:52:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       if ((err = mp_read_radix(order, (char *)ltc_ecc_sets[i].order, 16)) != CRYPT_OK)     { goto done; }
data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_test.c:68:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       if ((err = mp_read_radix(G->x, (char *)ltc_ecc_sets[i].Gx, 16)) != CRYPT_OK)         { goto done; }
data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_test.c:69:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       if ((err = mp_read_radix(G->y, (char *)ltc_ecc_sets[i].Gy, 16)) != CRYPT_OK)         { goto done; }
data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_verify_hash.c:28:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char ch, buf[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/prngs/chacha20.c:56:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[40];
data/dropbear-2020.81/libtomcrypt/src/prngs/chacha20.c:209:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char dmp[300];
data/dropbear-2020.81/libtomcrypt/src/prngs/chacha20.c:211:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char out[500];
data/dropbear-2020.81/libtomcrypt/src/prngs/fortuna.c:67:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/prngs/fortuna.c:138:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/prngs/fortuna.c:175:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/src/prngs/fortuna.c:216:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[2];
data/dropbear-2020.81/libtomcrypt/src/prngs/fortuna.c:279:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[16];
data/dropbear-2020.81/libtomcrypt/src/prngs/fortuna.c:348:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tmp[32];
data/dropbear-2020.81/libtomcrypt/src/prngs/rc4.c:58:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[256];
data/dropbear-2020.81/libtomcrypt/src/prngs/rc4.c:94:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[256] = { 0 };
data/dropbear-2020.81/libtomcrypt/src/prngs/rc4.c:212:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char dmp[500];
data/dropbear-2020.81/libtomcrypt/src/prngs/rc4.c:214:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char out[1000];
data/dropbear-2020.81/libtomcrypt/src/prngs/rng_get_bytes.c:32:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen("/dev/urandom", "rb");
data/dropbear-2020.81/libtomcrypt/src/prngs/rng_get_bytes.c:35:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       f = fopen("/dev/random", "rb");
data/dropbear-2020.81/libtomcrypt/src/prngs/rng_make_prng.c:28:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[256];
data/dropbear-2020.81/libtomcrypt/src/prngs/sober128.c:58:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[40];
data/dropbear-2020.81/libtomcrypt/src/prngs/sober128.c:211:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char dmp[300];
data/dropbear-2020.81/libtomcrypt/src/prngs/sober128.c:213:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char out[500];
data/dropbear-2020.81/libtomcrypt/src/prngs/sprng.c:141:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char out[1000];
data/dropbear-2020.81/libtomcrypt/src/stream/chacha/chacha_crypt.c:56:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[64];
data/dropbear-2020.81/libtomcrypt/src/stream/chacha/chacha_test.c:25:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char out[1000];
data/dropbear-2020.81/libtomcrypt/src/stream/rc4/rc4_test.c:24:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[10];
data/dropbear-2020.81/libtomcrypt/src/stream/sober128/sober128_test.c:19:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[16] = { 0x74, 0x65, 0x73, 0x74, 0x20, 0x6b, 0x65, 0x79,
data/dropbear-2020.81/libtomcrypt/src/stream/sober128/sober128_test.c:21:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iv[4]   = { 0x00, 0x00, 0x00, 0x00 };
data/dropbear-2020.81/libtomcrypt/src/stream/sober128/sober128_test.c:22:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char out[20] = { 0x43, 0x50, 0x0c, 0xcf, 0x89, 0x91, 0x9f, 0x1d,
data/dropbear-2020.81/libtomcrypt/src/stream/sober128/sober128_test.c:26:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char  src[20], dst[20];
data/dropbear-2020.81/libtomcrypt/testprof/base64_test.c:5:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char in[64], out[256], tmp[64];
data/dropbear-2020.81/libtomcrypt/testprof/cipher_hash_test.c:8:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[4096];
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:23:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char strs[10][10], outbuf[128];
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:66:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[0], "one");
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:67:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[1], "one2");
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:68:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[2], "two");
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:69:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[3], "aaa");
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:70:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[4], "aaaa");
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:71:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[5], "aab");
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:72:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[6], "aaab");
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:73:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[7], "bbb");
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:74:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[8], "bbba");
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:75:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[9], "bbbb");
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:144:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char encode_buf[192];
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:180:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     f = fopen("t.bin", "wb");
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:456:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char bitbuf[10], octetbuf[10], ia5buf[10], printbuf[10], outbuf[256];
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:514:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[3][2048];
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:540:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char utf8_buf[32];
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:541:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   wchar_t utf8_out[32];
data/dropbear-2020.81/libtomcrypt/testprof/dsa_test.c:7:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char msg[16], out[1024], out2[1024];
data/dropbear-2020.81/libtomcrypt/testprof/ecc_test.c:38:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[ECC_BUF_SIZE];
data/dropbear-2020.81/libtomcrypt/testprof/ecc_test.c:110:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[4][4096];
data/dropbear-2020.81/libtomcrypt/testprof/katja_test.c:7:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char in[1024], out[1024], tmp[1024];
data/dropbear-2020.81/libtomcrypt/testprof/modes_test.c:6:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char pt[64], ct[64], tmp[64], key[16], iv[16], iv2[16];
data/dropbear-2020.81/libtomcrypt/testprof/pkcs_1_test.c:7:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[3][128];
data/dropbear-2020.81/libtomcrypt/testprof/rsa_test.c:80:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[1024];
data/dropbear-2020.81/libtomcrypt/testprof/rsa_test.c:127:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char in[1024], out[1024], tmp[1024];
data/dropbear-2020.81/libtomcrypt/testprof/store_test.c:6:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[256];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:265:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:299:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[MAXBLOCKSIZE], pt[4096];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:371:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[MAXBLOCKSIZE], pt[4096];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:446:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[MAXBLOCKSIZE], pt[4096];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:521:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[MAXBLOCKSIZE], pt[4096];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:599:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char pt[MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:716:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[4096];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:816:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][2048];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:940:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][4096];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:1010:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][256];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:1155:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char *buf, key[16], tag[16];
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:1287:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char *buf, IV[16], key[16], tag[16];
data/dropbear-2020.81/libtomcrypt/tests/base64_test.c:14:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char in[64], out[256], tmp[64];
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:442:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[sizeof(_der_tests_cacert_root_cert)];
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:602:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char strs[10][10], outbuf[128];
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:637:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[0], "one");
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:638:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[1], "one2");
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:639:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[2], "two");
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:640:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[3], "aaa");
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:641:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[4], "aaaa");
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:642:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[5], "aab");
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:643:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[6], "aaab");
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:644:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[7], "bbb");
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:645:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[8], "bbba");
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:646:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((char*)strs[9], "bbbb");
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:711:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char encode_buf[192];
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:744:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     f = fopen("t.bin", "wb");
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1037:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char bitbuf[10], octetbuf[10], ia5buf[10], printbuf[10], outbuf[256], x, y;
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1103:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2048];
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1119:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[3][2048];
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1145:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char utf8_buf[32];
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1146:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   wchar_t utf8_out[32];
data/dropbear-2020.81/libtomcrypt/tests/dh_test.c:64:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[1024];
data/dropbear-2020.81/libtomcrypt/tests/dh_test.c:154:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[4096];
data/dropbear-2020.81/libtomcrypt/tests/dh_test.c:366:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[3][4096];
data/dropbear-2020.81/libtomcrypt/tests/dsa_test.c:135:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[1024], buf[1024];
data/dropbear-2020.81/libtomcrypt/tests/dsa_test.c:137:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key_parts[5][256];
data/dropbear-2020.81/libtomcrypt/tests/dsa_test.c:281:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char derkey[838];
data/dropbear-2020.81/libtomcrypt/tests/dsa_test.c:283:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char hash[32];
data/dropbear-2020.81/libtomcrypt/tests/dsa_test.c:322:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char msg[16], out[1024], out2[1024], ch;
data/dropbear-2020.81/libtomcrypt/tests/ecc_test.c:46:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[ECC_BUF_SIZE];
data/dropbear-2020.81/libtomcrypt/tests/ecc_test.c:118:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[4][4096], ch;
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:18:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[32] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:20:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[200];
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:27:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char exp_sha256[32]     = { 0x76, 0xEC, 0x7F, 0xAE, 0xBD, 0xC4, 0x2A, 0x4D, 0xE3, 0x5C, 0xA7, 0x00, 0x24, 0xC2, 0xD2, 0x73,
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:33:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((in = fopen(fname, "rb")) == NULL)                                       return CRYPT_FILE_NOTFOUND;
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:45:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char exp_hmacsha256[32] = { 0xE4, 0x07, 0x74, 0x95, 0xF1, 0xF8, 0x5B, 0xB5, 0xF1, 0x4F, 0x7D, 0x4F, 0x59, 0x8E, 0x4B, 0xBC,
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:54:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char exp_omacaes[16]    = { 0x50, 0xB4, 0x6C, 0x62, 0xE9, 0xCA, 0x48, 0xFC, 0x38, 0x8D, 0xF4, 0xA2, 0x7D, 0x6A, 0x1E, 0xD8 };
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:62:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char exp_pmacaes[16]    = { 0x7D, 0x65, 0xF0, 0x75, 0x4F, 0x8D, 0xE2, 0xB0, 0xE4, 0xFA, 0x54, 0x4E, 0x45, 0x01, 0x36, 0x1B };
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:70:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char exp_xcbcaes[16]    = { 0x9C, 0x73, 0xA2, 0xD7, 0x90, 0xA5, 0x86, 0x25, 0x4D, 0x3C, 0x8A, 0x6A, 0x24, 0x6D, 0xD1, 0xAB };
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:78:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char exp_f9aes[16]      = { 0x6B, 0x6A, 0x18, 0x34, 0x13, 0x8E, 0x01, 0xEF, 0x33, 0x8E, 0x7A, 0x3F, 0x5B, 0x9A, 0xA6, 0x7A };
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:86:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char exp_poly1305[16]   = { 0xD0, 0xC7, 0xFB, 0x13, 0xA8, 0x87, 0x84, 0x23, 0x21, 0xCC, 0xA9, 0x43, 0x81, 0x18, 0x75, 0xBE };
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:94:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char exp_blake2smac[16]   = { 0x4f, 0x94, 0x45, 0x15, 0xcd, 0xd1, 0xca, 0x02, 0x1a, 0x0c, 0x7a, 0xe4, 0x6d, 0x2f, 0xe8, 0xb3 };
data/dropbear-2020.81/libtomcrypt/tests/file_test.c:102:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char exp_blake2bmac[16]   = { 0xdf, 0x0e, 0x7a, 0xab, 0x96, 0x6b, 0x75, 0x4e, 0x52, 0x6a, 0x43, 0x96, 0xbd, 0xef, 0xab, 0x44 };
data/dropbear-2020.81/libtomcrypt/tests/katja_test.c:15:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char in[1024], out[1024], tmp[1024];
data/dropbear-2020.81/libtomcrypt/tests/modes_test.c:25:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char pt[64], ct[64], tmp[64], key[16], iv[16], iv2[16];
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:114:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key_parts[4][256];
data/dropbear-2020.81/libtomcrypt/tests/multi_test.c:14:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key[32] = { 0 };
data/dropbear-2020.81/libtomcrypt/tests/multi_test.c:15:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[2][MAXBLOCKSIZE];
data/dropbear-2020.81/libtomcrypt/tests/no_prng.c:21:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[64];
data/dropbear-2020.81/libtomcrypt/tests/no_prng.c:22:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char entropy[1024];
data/dropbear-2020.81/libtomcrypt/tests/no_prng.c:59:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(no_prng->entropy, in, no_prng->len);
data/dropbear-2020.81/libtomcrypt/tests/no_prng.c:93:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(out, &no_prng->entropy[no_prng->offset], outlen);
data/dropbear-2020.81/libtomcrypt/tests/pkcs_1_eme_test.c:46:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[256], obuf[256];
data/dropbear-2020.81/libtomcrypt/tests/pkcs_1_emsa_test.c:43:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[20], obuf[256];
data/dropbear-2020.81/libtomcrypt/tests/pkcs_1_oaep_test.c:46:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[256], obuf[256];
data/dropbear-2020.81/libtomcrypt/tests/pkcs_1_pss_test.c:46:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[20], obuf[256];
data/dropbear-2020.81/libtomcrypt/tests/pkcs_1_test.c:21:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[3][128];
data/dropbear-2020.81/libtomcrypt/tests/prng_test.c:33:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[4096] = { 0 };
data/dropbear-2020.81/libtomcrypt/tests/rsa_test.c:185:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[1024], key_parts[8][128];
data/dropbear-2020.81/libtomcrypt/tests/rsa_test.c:316:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[4096];
data/dropbear-2020.81/libtomcrypt/tests/rsa_test.c:348:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char in[1024], out[1024], tmp[3072];
data/dropbear-2020.81/libtomcrypt/tests/store_test.c:14:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[256];
data/dropbear-2020.81/libtommath/bn_mp_is_square.c:7:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char rem_128[128] = {
data/dropbear-2020.81/libtommath/bn_mp_is_square.c:18:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char rem_105[105] = {
data/dropbear-2020.81/libtommath/bn_s_mp_rand_platform.c:94:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd = open(MP_DEV_URANDOM, O_RDONLY);
data/dropbear-2020.81/listener.c:125:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newlisten->socks, socks, nsocks * sizeof(int));
data/dropbear-2020.81/loginrec.c:535:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ut->ut_addr_v6, sa6->sin6_addr.s6_addr, 16);
data/dropbear-2020.81/loginrec.c:615:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ut->ut_addr_v6, sa6->sin6_addr.s6_addr, 16);
data/dropbear-2020.81/loginrec.c:694:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (tty > 0 && (fd = open(UTMP_FILE, O_RDWR|O_CREAT, 0644)) >= 0) {
data/dropbear-2020.81/loginrec.c:892:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(WTMP_FILE, O_WRONLY|O_APPEND, 0)) < 0) {
data/dropbear-2020.81/loginrec.c:985:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(WTMP_FILE, O_RDONLY)) < 0) {
data/dropbear-2020.81/loginrec.c:1058:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(WTMPX_FILE, O_WRONLY|O_APPEND, 0)) < 0) {
data/dropbear-2020.81/loginrec.c:1141:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(WTMPX_FILE, O_RDONLY)) < 0) {
data/dropbear-2020.81/loginrec.c:1221:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[8];
data/dropbear-2020.81/loginrec.c:1303:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lastlog_file[1024];
data/dropbear-2020.81/loginrec.c:1320:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*fd = open(lastlog_file, filemode, 0600);
data/dropbear-2020.81/loginrec.h:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char       progname[LINFO_PROGSIZE];     /* name of program (for PAM) */
data/dropbear-2020.81/loginrec.h:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char       line[LINFO_LINESIZE];         /* tty/pty name */
data/dropbear-2020.81/loginrec.h:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char       username[LINFO_NAMESIZE];     /* login username */
data/dropbear-2020.81/loginrec.h:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char       hostname[LINFO_HOSTSIZE];     /* remote hostname */
data/dropbear-2020.81/netio.c:414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char strport[NI_MAXSERV];
data/dropbear-2020.81/netio.c:438:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(strport);
data/dropbear-2020.81/netio.c:626:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char host[NI_MAXHOST+1], serv[NI_MAXSERV+1];
data/dropbear-2020.81/packet.c:392:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mac_bytes[MAX_MAC_LEN];
data/dropbear-2020.81/packet.c:539:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mac_bytes[MAX_MAC_LEN];
data/dropbear-2020.81/packet.c:588:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf_getwriteptr(writebuf, ses.writepayload->len),
data/dropbear-2020.81/packet.c:700:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char seqbuf[4];
data/dropbear-2020.81/progressmeter.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_WINSIZE + 1];
data/dropbear-2020.81/runopts.h:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *ports[DROPBEAR_MAX_PORTS];
data/dropbear-2020.81/runopts.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *addresses[DROPBEAR_MAX_PORTS];
data/dropbear-2020.81/runopts.h:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *hostkey_files[MAX_HOSTKEYS];
data/dropbear-2020.81/scp.c:137:8:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
	pid = vfork();
data/dropbear-2020.81/scp.c:222:15:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
	do_cmd_pid = vfork();
data/dropbear-2020.81/scp.c:297:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cmd[CMDNEEDS];		/* must hold "rcp -r -p -d\0" */
data/dropbear-2020.81/scp.c:608:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *last, *name, buf[2048];
data/dropbear-2020.81/scp.c:622:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fd = open(name, O_RDONLY, 0)) < 0)
data/dropbear-2020.81/scp.c:723:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *last, *vect[1], path[1100];
data/dropbear-2020.81/scp.c:839:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ch, *cp, *np, *targ, *why, *vect[1], buf[2048];
data/dropbear-2020.81/scp.c:996:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((ofd = open(np, O_WRONLY|O_CREAT, mode)) < 0) {
data/dropbear-2020.81/scp.c:1114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ch, *cp, resp, rbuf[2048];
data/dropbear-2020.81/scpmisc.c:238:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((nullfd = dupfd = open(DROPBEAR_PATH_DEVNULL, O_RDWR)) == -1) {
data/dropbear-2020.81/session.h:97:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mackey[MAX_MAC_LEN];
data/dropbear-2020.81/signkey.c:35:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const signkey_names[DROPBEAR_SIGNKEY_NUM_NAMED] = {
data/dropbear-2020.81/signkey.c:521:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[MD5_HASH_SIZE];
data/dropbear-2020.81/signkey.c:537:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(ret, "md5 ");
data/dropbear-2020.81/signkey.c:556:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[SHA1_HASH_SIZE];
data/dropbear-2020.81/signkey.c:571:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(ret, "sha1!! ");
data/dropbear-2020.81/sshpty.c:85:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*ttyfd = open(namebuf, O_RDWR | O_NOCTTY);
data/dropbear-2020.81/sshpty.c:104:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ptm = open("/dev/ptmx", O_RDWR | O_NOCTTY);
data/dropbear-2020.81/sshpty.c:129:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*ttyfd = open(namebuf, O_RDWR | O_NOCTTY);
data/dropbear-2020.81/sshpty.c:162:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*ptyfd = open("/dev/ptc", O_RDWR | O_NOCTTY);
data/dropbear-2020.81/sshpty.c:173:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*ttyfd = open(name, O_RDWR | O_NOCTTY);
data/dropbear-2020.81/sshpty.c:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/dropbear-2020.81/sshpty.c:199:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		*ptyfd = open(buf, O_RDWR | O_NOCTTY);
data/dropbear-2020.81/sshpty.c:204:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			*ptyfd = open(buf, O_RDWR | O_NOCTTY);
data/dropbear-2020.81/sshpty.c:211:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		*ttyfd = open(namebuf, O_RDWR | O_NOCTTY);
data/dropbear-2020.81/sshpty.c:278:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(_PATH_TTY, O_RDWR | O_NOCTTY);
data/dropbear-2020.81/sshpty.c:293:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(_PATH_TTY, O_RDWR | O_NOCTTY);
data/dropbear-2020.81/sshpty.c:317:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(tty_name, O_RDWR);
data/dropbear-2020.81/sshpty.c:330:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(_PATH_TTY, O_WRONLY);
data/dropbear-2020.81/svr-agentfwd.c:216:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[(sizeof(addr.sun_path)-1)/2], sockfile[(sizeof(addr.sun_path)-1)/2];
data/dropbear-2020.81/svr-authpubkey.c:408:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	authfile = fopen(filename, "r");
data/dropbear-2020.81/svr-authpubkeyoptions.c:183:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(ses.authstate.pubkey_options->forced_command,
data/dropbear-2020.81/svr-chansession.c:579:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char namebuf[65];
data/dropbear-2020.81/svr-chansession.c:811:8:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
	pid = vfork();
data/dropbear-2020.81/svr-chansession.c:1057:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newvar, param, plen);
data/dropbear-2020.81/svr-chansession.c:1059:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&newvar[plen+1], var, vlen);
data/dropbear-2020.81/svr-main.c:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char * preauth_addrs[MAX_UNAUTH_CLIENTS];
data/dropbear-2020.81/svr-main.c:174:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	pidfile = fopen(svr_opts.pidfile, "w");
data/dropbear-2020.81/svr-runopts.c:384:22:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		opts.recv_window = atol(recv_window_arg);
data/dropbear-2020.81/svr-session.c:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exitmsg[150];
data/dropbear-2020.81/svr-session.c:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullmsg[300];
data/dropbear-2020.81/svr-session.c:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fromaddr[60];
data/dropbear-2020.81/svr-session.c:285:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char printbuf[1024];
data/dropbear-2020.81/svr-session.c:286:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char datestr[20];
data/dropbear-2020.81/svr-tcpfwd.c:254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char portstring[NI_MAXSERV];
data/dropbear-2020.81/svr-x11fwd.c:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char display[20]; /* space for "localhost:12345.123" */
data/dropbear-2020.81/tcp-accept.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipstring[NI_MAXHOST], portstring[NI_MAXSERV];
data/dropbear-2020.81/tcp-accept.c:103:32:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		buf_putint(ses.writepayload, atol(portstring));
data/dropbear-2020.81/tcp-accept.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char portstring[NI_MAXSERV];
data/dropbear-2020.81/cli-agentfwd.c:145:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = atomicio(read, fd, buf_getwriteptr(inbuf, 4), 4);
data/dropbear-2020.81/cli-agentfwd.c:161:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = atomicio(read, fd, buf_getwriteptr(inbuf, readlen), readlen);
data/dropbear-2020.81/cli-auth.c:47:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(cli_opts.username));
data/dropbear-2020.81/cli-authinteract.c:55:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		unsigned int buflen = strlen(buf);
data/dropbear-2020.81/cli-authinteract.c:104:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(name) > 0) {
data/dropbear-2020.81/cli-authinteract.c:110:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(instruction) > 0) {
data/dropbear-2020.81/cli-authinteract.c:126:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			m_burn(p, strlen(p));
data/dropbear-2020.81/cli-authinteract.c:131:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		response_len = strlen(response);
data/dropbear-2020.81/cli-authinteract.c:153:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(cli_opts.username));
data/dropbear-2020.81/cli-authpasswd.c:92:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		len = read(p[0], buf + sizeof(buf) - maxlen, maxlen);
data/dropbear-2020.81/cli-authpasswd.c:144:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(cli_opts.username));
data/dropbear-2020.81/cli-authpasswd.c:154:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(ses.writepayload, password, strlen(password));
data/dropbear-2020.81/cli-authpasswd.c:157:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	m_burn(password, strlen(password));
data/dropbear-2020.81/cli-authpubkey.c:156:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(cli_opts.username));
data/dropbear-2020.81/cli-chansession.c:290:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(ses.writepayload, term, strlen(term));
data/dropbear-2020.81/cli-chansession.c:328:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buf_putstring(ses.writepayload, cli_opts.cmd, strlen(cli_opts.cmd));
data/dropbear-2020.81/cli-chansession.c:409:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(cli_opts.netcat_host));
data/dropbear-2020.81/cli-chansession.c:413:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(ses.writepayload, source_host, strlen(source_host));
data/dropbear-2020.81/cli-kex.c:228:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		response = getc(tty);
data/dropbear-2020.81/cli-kex.c:231:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		response = getc(stdin);
data/dropbear-2020.81/cli-kex.c:259:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(homedir);
data/dropbear-2020.81/cli-kex.c:327:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hostlen = strlen(cli_opts.remotehost);
data/dropbear-2020.81/cli-kex.c:453:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				&& name_len == strlen(SSH_SERVER_SIG_ALGS)
data/dropbear-2020.81/cli-main.c:131:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ex_cmdlen = strlen(cli_opts.proxycmd) + 6; /* "exec " + command + '\0' */
data/dropbear-2020.81/cli-runopts.c:399:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cmdlen += strlen(argv[j]) + 1; /* +1 for spaces */
data/dropbear-2020.81/cli-runopts.c:434:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(bind_arg) > 0) {
data/dropbear-2020.81/cli-runopts.c:537:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len += 3 + strlen(key->filename);
data/dropbear-2020.81/cli-runopts.c:608:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		unsigned int len = strlen(orighostarg) + strlen(cli_opts.username) + 2;
data/dropbear-2020.81/cli-runopts.c:608:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		unsigned int len = strlen(orighostarg) + strlen(cli_opts.username) + 2;
data/dropbear-2020.81/cli-runopts.c:639:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cmd_len = strlen(argv0) + strlen(remainder) 
data/dropbear-2020.81/cli-runopts.c:639:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cmd_len = strlen(argv0) + strlen(remainder) 
data/dropbear-2020.81/cli-runopts.c:640:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			+ strlen(cli_opts.remotehost) + strlen(cli_opts.remoteport)
data/dropbear-2020.81/cli-runopts.c:640:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			+ strlen(cli_opts.remotehost) + strlen(cli_opts.remoteport)
data/dropbear-2020.81/cli-runopts.c:641:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			+ strlen(passthrough_args)
data/dropbear-2020.81/cli-runopts.c:845:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int optlen = strlen(optname);
data/dropbear-2020.81/cli-session.c:192:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(ses.writepayload, servicename, strlen(servicename));
data/dropbear-2020.81/cli-tcpfwd.c:159:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(ses.writepayload, addr, strlen(addr));
data/dropbear-2020.81/common-algo.c:354:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(localalgos[i].name);
data/dropbear-2020.81/common-channel.c:749:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	len = read(fd, buf_getwriteptr(ses.writepayload, maxlen), maxlen);
data/dropbear-2020.81/common-channel.c:1045:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(ses.writepayload, text, strlen(text));
data/dropbear-2020.81/common-channel.c:1046:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(ses.writepayload, lang, strlen(lang));
data/dropbear-2020.81/common-channel.c:1146:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(ses.writepayload, type->name, strlen(type->name));
data/dropbear-2020.81/common-channel.c:1247:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(ses.writepayload, type, strlen(type));
data/dropbear-2020.81/common-kex.c:497:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	local_ident_len = strlen(LOCAL_IDENT);
data/dropbear-2020.81/common-kex.c:498:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	remote_ident_len = strlen(ses.remoteident);
data/dropbear-2020.81/common-session.c:233:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while (read(ses.signal_pipe[0], &x, 1) > 0) {}
data/dropbear-2020.81/common-session.c:362:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer *writebuf = buf_new(strlen(LOCAL_IDENT "\r\n") + 1);
data/dropbear-2020.81/common-session.c:363:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putbytes(writebuf, (const unsigned char *) LOCAL_IDENT "\r\n", strlen(LOCAL_IDENT "\r\n"));
data/dropbear-2020.81/common-session.c:452:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			num = read(fd, &in, 1);
data/dropbear-2020.81/common-session.c:512:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(DROPBEAR_KEEPALIVE_STRING));
data/dropbear-2020.81/compat.c:111:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen(src);
data/dropbear-2020.81/compat.c:141:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return(dlen + strlen(s));
data/dropbear-2020.81/dbmalloc.c:15:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str);
data/dropbear-2020.81/dbrandom.c:92:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		readlen = read(readfd, readbuf, wantread);
data/dropbear-2020.81/dbrandom.c:156:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha1_process(&hs, "fuzzfuzzfuzz", strlen("fuzzfuzzfuzz"));
data/dropbear-2020.81/dbutil.c:358:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(baseshell) + 2; /* 2 for "-" */
data/dropbear-2020.81/dbutil.c:424:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(text);
data/dropbear-2020.81/dbutil.c:458:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		len = read(fd, buf_getwriteptr(buf, maxlen), maxlen);
data/dropbear-2020.81/dbutil.c:491:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(authfile); /*getc() is weird with some uClibc systems*/
data/dropbear-2020.81/dbutil.c:590:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen(inpath) + strlen(pw->pw_dir) + 2;
data/dropbear-2020.81/dbutil.c:590:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen(inpath) + strlen(pw->pw_dir) + 2;
data/dropbear-2020.81/dropbearconvert.c:102:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(077);
data/dropbear-2020.81/ecdsa.c:89:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (key_ident_len != identifier_len + strlen("ecdsa-sha2-")) {
data/dropbear-2020.81/ecdsa.c:93:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (memcmp(&key_ident[strlen("ecdsa-sha2-")], identifier, identifier_len) != 0) {
data/dropbear-2020.81/ecdsa.c:99:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (memcmp(identifier, (char*)(*curve)->name, strlen((char*)(*curve)->name)) == 0) {
data/dropbear-2020.81/ecdsa.c:146:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(buf, key_ident, strlen(key_ident));
data/dropbear-2020.81/ecdsa.c:147:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(buf, curve->name, strlen(curve->name));
data/dropbear-2020.81/ecdsa.c:225:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(buf, key_ident, strlen(key_ident));
data/dropbear-2020.81/fuzz-wrapfd.c:93:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return read(fd, out, count);
data/dropbear-2020.81/fuzz.h:46:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define read(fd, buf, count) wrapfd_read(fd, buf, count)
data/dropbear-2020.81/gensignkey.c:152:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fn_temp = m_malloc(strlen(filename) + 30);
data/dropbear-2020.81/gensignkey.c:153:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(fn_temp, strlen(filename)+30, "%s.tmp%d", filename, getpid());
data/dropbear-2020.81/keyimport.c:392:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(filename) == 1 && filename[0] == '-') {
data/dropbear-2020.81/keyimport.c:403:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		0 != strcmp(buffer+strlen(buffer)-17, "PRIVATE KEY-----\n")) {
data/dropbear-2020.81/keyimport.c:428:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			0 == strcmp(buffer+strlen(buffer)-17, "PRIVATE KEY-----\n"))
data/dropbear-2020.81/keyimport.c:466:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(buffer);
data/dropbear-2020.81/keyimport.c:586:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		MD5Update(&md5c, (unsigned char *)passphrase, strlen(passphrase));
data/dropbear-2020.81/keyimport.c:592:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		MD5Update(&md5c, (unsigned char *)passphrase, strlen(passphrase));
data/dropbear-2020.81/keyimport.c:1300:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(filename) == 1 && filename[0] == '-') {
data/dropbear-2020.81/keyimport.c:1462:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			while ((len = strlen(p)) > (int)(sizeof(buffer) - (p-buffer) -1) ||
data/dropbear-2020.81/keyimport.c:1476:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (p[0] == '"' && p[strlen(p)-1] == '"') {
data/dropbear-2020.81/keyimport.c:1478:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					p[strlen(p)-1] = '\0';
data/dropbear-2020.81/keyimport.c:1480:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(ret->comment, p, sizeof(ret->comment));
data/dropbear-2020.81/keyimport.c:1720:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		MD5Update(&md5c, (unsigned char *)passphrase, strlen(passphrase));
data/dropbear-2020.81/keyimport.c:1724:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		MD5Update(&md5c, (unsigned char *)passphrase, strlen(passphrase));
data/dropbear-2020.81/keyimport.c:1943:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos += put_string(outblob+pos, type, strlen(type));
data/dropbear-2020.81/keyimport.c:1946:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pos += put_string(outblob+pos, ciphertype, strlen(ciphertype));
data/dropbear-2020.81/keyimport.c:1992:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		MD5Update(&md5c, (unsigned char *)passphrase, strlen(passphrase));
data/dropbear-2020.81/keyimport.c:1996:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		MD5Update(&md5c, (unsigned char *)passphrase, strlen(passphrase));
data/dropbear-2020.81/keyimport.c:2029:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		while ((int)strlen(c) > slen) {
data/dropbear-2020.81/libtomcrypt/demos/encrypt.c:161:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((errno = hash_memory(hash_idx,tmpkey,strlen((char *)tmpkey),key,&outlen)) != CRYPT_OK) {
data/dropbear-2020.81/libtomcrypt/demos/ltcrypt.c:125:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((err = hash_memory(hash_idx,tmpkey,strlen((char *)tmpkey),key,&outlen)) != CRYPT_OK) {
data/dropbear-2020.81/libtomcrypt/demos/openssl-enc.c:364:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ret = pkcs_5_alg1_openssl((unsigned char*)argv[4], strlen(argv[4]), salt,
data/dropbear-2020.81/libtomcrypt/demos/timing.c:619:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define DO1 if (prng_descriptor[x].read(buf, 4096, &tprng) != 4096) { fprintf(stderr, "\n\nERROR READ != 4096\n\n"); exit(EXIT_FAILURE); }
data/dropbear-2020.81/libtomcrypt/src/encauth/chachapoly/chacha20poly1305_test.c:34:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   unsigned long mlen = strlen(m);
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:433:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      blake2b_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:480:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      blake2b_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:533:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      blake2b_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2b.c:574:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      blake2b_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:423:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      blake2s_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:467:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      blake2s_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:509:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      blake2s_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/blake2s.c:549:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      blake2s_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/chc/chc.c:288:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       chc_process(&md, tests[i].msg, strlen((char *)tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/md2.c:235:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       md2_process(&md, (unsigned char*)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/md4.c:289:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        md4_process(&md, (unsigned char *)tests[i].input, (unsigned long)strlen(tests[i].input));
data/dropbear-2020.81/libtomcrypt/src/hashes/md5.c:350:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      md5_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd128.c:391:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       rmd128_process(&md, (unsigned char *)tests[i].msg, strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd160.c:450:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       rmd160_process(&md, (unsigned char *)tests[i].msg, strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd256.c:416:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       rmd256_process(&md, (unsigned char *)tests[i].msg, strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/rmd320.c:481:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       rmd320_process(&md, (unsigned char *)tests[i].msg, strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/sha1.c:270:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sha1_process(&md, (unsigned char*)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha224.c:114:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sha224_process(&md, (unsigned char*)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha256.c:318:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sha256_process(&md, (unsigned char*)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha384.c:120:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sha384_process(&md, (unsigned char*)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512.c:296:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sha512_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512_224.c:116:76:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sha512_224_process(&md, (unsigned char*)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/sha2/sha512_256.c:116:76:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sha512_256_process(&md, (unsigned char*)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/hashes/tiger.c:774:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tiger_process(&md, (unsigned char *)tests[i].msg, (unsigned long)strlen(tests[i].msg));
data/dropbear-2020.81/libtomcrypt/src/headers/tomcrypt_prng.h:110:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    unsigned long (*read)(unsigned char *out, unsigned long outlen, prng_state *prng);
data/dropbear-2020.81/libtomcrypt/src/mac/poly1305/poly1305_test.c:28:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   unsigned long len = 16, mlen = strlen(m);
data/dropbear-2020.81/libtomcrypt/src/math/gmp_desc.c:155:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tmp = XMALLOC (1 + 2 * strlen (b));
data/dropbear-2020.81/libtomcrypt/src/math/rand_bn.c:34:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (prng_descriptor[wprng].read(buf, bytes, prng) != (unsigned long)bytes) {
data/dropbear-2020.81/libtomcrypt/src/math/rand_prime.c:53:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (prng_descriptor[wprng].read(buf, len, prng) != (unsigned long)len) {
data/dropbear-2020.81/libtomcrypt/src/misc/adler32.c:119:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   adler32_update(&ctx, in, strlen(in));
data/dropbear-2020.81/libtomcrypt/src/misc/crc32.c:190:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   crc32_update(&ctx, in, strlen(in));
data/dropbear-2020.81/libtomcrypt/src/pk/dh/dh_generate_key.c:75:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (prng_descriptor[wprng].read(buf, keysize, prng) != keysize) {
data/dropbear-2020.81/libtomcrypt/src/pk/dsa/dsa_generate_pqg.c:130:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (prng_descriptor[wprng].read(sbuf, seedbytes, prng) != seedbytes)       { err = CRYPT_ERROR_READPRNG; goto cleanup; }
data/dropbear-2020.81/libtomcrypt/src/pk/ecc/ecc_make_key.c:77:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) {
data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_oaep_encode.c:109:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (prng_descriptor[prng_idx].read(seed, hLen, prng) != hLen) {
data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_pss_encode.c:87:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (prng_descriptor[prng_idx].read(salt, saltlen, prng) != saltlen) {
data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_v1_5_encode.c:75:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (prng_descriptor[prng_idx].read(ps, ps_len, prng) != ps_len) {
data/dropbear-2020.81/libtomcrypt/src/pk/pkcs1/pkcs_1_v1_5_encode.c:83:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (prng_descriptor[prng_idx].read(&ps[i], 1, prng) != 1) {
data/dropbear-2020.81/libtomcrypt/src/stream/chacha/chacha_test.c:42:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(pt);
data/dropbear-2020.81/libtomcrypt/testprof/cipher_hash_test.c:33:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (prng_descriptor[x].read(buf, 100, &nprng) != 100) {
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:78:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       LTC_SET_ASN1(list, x, LTC_ASN1_PRINTABLE_STRING, strs[x], strlen((char*)strs[x]));
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:99:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!(strlen((char*)strs[x-1]) <= strlen((char*)strs[x])) && strcmp((char*)strs[x-1], (char*)strs[x]) >= 0) {
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:99:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!(strlen((char*)strs[x-1]) <= strlen((char*)strs[x])) && strcmp((char*)strs[x-1], (char*)strs[x]) >= 0) {
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:151:86:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   LTC_SET_ASN1(static_list[0], 0, LTC_ASN1_PRINTABLE_STRING, (void *)printable_str, strlen(printable_str));
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:152:86:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   LTC_SET_ASN1(static_list[0], 1, LTC_ASN1_IA5_STRING,       (void *)ia5_str,       strlen(ia5_str));
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:167:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   LTC_SET_ASN1(static_list[4], 0, LTC_ASN1_PRINTABLE_STRING, set1_str, strlen(set1_str));
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:168:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   LTC_SET_ASN1(static_list[4], 1, LTC_ASN1_PRINTABLE_STRING, set2_str, strlen(set2_str));
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:224:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (l->size != strlen(printable_str) || memcmp(printable_str, l->data, l->size)) {
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:244:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (l->size != strlen(ia5_str) || memcmp(ia5_str, l->data, l->size)) {
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:428:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (l->size != strlen(set2_str) || memcmp(set2_str, l->data, l->size)) {
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:443:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (l->size != strlen(set1_str) || memcmp(set1_str, l->data, l->size)) {
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:709:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   DO(der_encode_ia5_string(rsa_ia5, strlen((char*)rsa_ia5), buf[0], &x));
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:714:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   DO(der_length_ia5_string(rsa_ia5, strlen((char*)rsa_ia5), &y));
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:721:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (y != strlen((char*)rsa_ia5) || memcmp(buf[1], rsa_ia5, strlen((char*)rsa_ia5))) {
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:721:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (y != strlen((char*)rsa_ia5) || memcmp(buf[1], rsa_ia5, strlen((char*)rsa_ia5))) {
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:728:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   DO(der_encode_printable_string(rsa_printable, strlen((char*)rsa_printable), buf[0], &x));
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:733:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   DO(der_length_printable_string(rsa_printable, strlen((char*)rsa_printable), &y));
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:740:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (y != strlen((char*)rsa_printable) || memcmp(buf[1], rsa_printable, strlen((char*)rsa_printable))) {
data/dropbear-2020.81/libtomcrypt/testprof/der_tests.c:740:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (y != strlen((char*)rsa_printable) || memcmp(buf[1], rsa_printable, strlen((char*)rsa_printable))) {
data/dropbear-2020.81/libtomcrypt/testprof/x86_prof.c:736:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define DO1 if (prng_descriptor[x].read(buf, 4096, &tprng) != 4096) { fprintf(stderr, "\n\nERROR READ != 4096\n\n"); exit(EXIT_FAILURE); }
data/dropbear-2020.81/libtomcrypt/tests/base64_test.c:64:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       slen1 = strlen(url_cases[x].s);
data/dropbear-2020.81/libtomcrypt/tests/base64_test.c:79:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (compare_testvector(tmp, l2, url_cases[x].s, strlen(url_cases[x].s), "base64url encode", x)) {
data/dropbear-2020.81/libtomcrypt/tests/base64_test.c:92:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       slen1 = strlen(cases[x].s);
data/dropbear-2020.81/libtomcrypt/tests/base64_test.c:97:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (compare_testvector(out, l1, cases[x].b64, strlen(cases[x].b64), "base64 encode", x) ||
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:649:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       LTC_SET_ASN1(list, x, LTC_ASN1_PRINTABLE_STRING, strs[x], strlen((char*)strs[x]));
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:664:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!(strlen((char*)strs[x-1]) <= strlen((char*)strs[x])) && strcmp((char*)strs[x-1], (char*)strs[x]) >= 0) {
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:664:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!(strlen((char*)strs[x-1]) <= strlen((char*)strs[x])) && strcmp((char*)strs[x-1], (char*)strs[x]) >= 0) {
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:717:86:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   LTC_SET_ASN1(static_list[0], 0, LTC_ASN1_PRINTABLE_STRING, (void *)printable_str, strlen(printable_str));
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:718:86:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   LTC_SET_ASN1(static_list[0], 1, LTC_ASN1_IA5_STRING,       (void *)ia5_str,       strlen(ia5_str));
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:734:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   LTC_SET_ASN1(static_list[4], 0, LTC_ASN1_PRINTABLE_STRING, set1_str, strlen(set1_str));
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:735:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   LTC_SET_ASN1(static_list[4], 1, LTC_ASN1_PRINTABLE_STRING, set2_str, strlen(set2_str));
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:785:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (l->size != strlen(printable_str) || memcmp(printable_str, l->data, l->size)) {
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:805:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (l->size != strlen(ia5_str) || memcmp(ia5_str, l->data, l->size)) {
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1009:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (l->size != strlen(set2_str) || memcmp(set2_str, l->data, l->size)) {
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1024:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (l->size != strlen(set1_str) || memcmp(set1_str, l->data, l->size)) {
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1323:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   DO(der_encode_ia5_string(rsa_ia5, strlen((char*)rsa_ia5), buf[0], &x));
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1328:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   DO(der_length_ia5_string(rsa_ia5, strlen((char*)rsa_ia5), &y));
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1335:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (y != strlen((char*)rsa_ia5) || memcmp(buf[1], rsa_ia5, strlen((char*)rsa_ia5))) {
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1335:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (y != strlen((char*)rsa_ia5) || memcmp(buf[1], rsa_ia5, strlen((char*)rsa_ia5))) {
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1342:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   DO(der_encode_printable_string(rsa_printable, strlen((char*)rsa_printable), buf[0], &x));
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1347:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   DO(der_length_printable_string(rsa_printable, strlen((char*)rsa_printable), &y));
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1354:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (y != strlen((char*)rsa_printable) || memcmp(buf[1], rsa_printable, strlen((char*)rsa_printable))) {
data/dropbear-2020.81/libtomcrypt/tests/der_test.c:1354:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (y != strlen((char*)rsa_printable) || memcmp(buf[1], rsa_printable, strlen((char*)rsa_printable))) {
data/dropbear-2020.81/libtomcrypt/tests/dsa_test.c:288:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   DO(base64_decode((unsigned char*)b64key, strlen(b64key), derkey, &derlen));
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:109:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 16,  ghex, strlen(ghex)+1, phex, strlen(phex)+1, xhex, strlen(xhex)+1, yhex, strlen(yhex)+1 },
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:109:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 16,  ghex, strlen(ghex)+1, phex, strlen(phex)+1, xhex, strlen(xhex)+1, yhex, strlen(yhex)+1 },
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:109:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 16,  ghex, strlen(ghex)+1, phex, strlen(phex)+1, xhex, strlen(xhex)+1, yhex, strlen(yhex)+1 },
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:109:86:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 16,  ghex, strlen(ghex)+1, phex, strlen(phex)+1, xhex, strlen(xhex)+1, yhex, strlen(yhex)+1 },
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:110:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 47,  gr47, strlen(gr47)+1, pr47, strlen(pr47)+1, xr47, strlen(xr47)+1, yr47, strlen(yr47)+1 },
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:110:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 47,  gr47, strlen(gr47)+1, pr47, strlen(pr47)+1, xr47, strlen(xr47)+1, yr47, strlen(yr47)+1 },
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:110:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 47,  gr47, strlen(gr47)+1, pr47, strlen(pr47)+1, xr47, strlen(xr47)+1, yr47, strlen(yr47)+1 },
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:110:86:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 47,  gr47, strlen(gr47)+1, pr47, strlen(pr47)+1, xr47, strlen(xr47)+1, yr47, strlen(yr47)+1 },
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:111:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 64,  gr64, strlen(gr64)+1, pr64, strlen(pr64)+1, xr64, strlen(xr64)+1, yr64, strlen(yr64)+1 },
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:111:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 64,  gr64, strlen(gr64)+1, pr64, strlen(pr64)+1, xr64, strlen(xr64)+1, yr64, strlen(yr64)+1 },
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:111:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 64,  gr64, strlen(gr64)+1, pr64, strlen(pr64)+1, xr64, strlen(xr64)+1, yr64, strlen(yr64)+1 },
data/dropbear-2020.81/libtomcrypt/tests/mpi_test.c:111:86:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { 64,  gr64, strlen(gr64)+1, pr64, strlen(pr64)+1, xr64, strlen(xr64)+1, yr64, strlen(yr64)+1 },
data/dropbear-2020.81/libtomcrypt/tests/prng_test.c:79:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (prng_descriptor[x].read(buf, 100, &nprng) != 100) {
data/dropbear-2020.81/libtomcrypt/tests/test.c:355:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(test_functions[i].name);
data/dropbear-2020.81/libtomcrypt/tests/test.c:379:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      dots = fn_len - strlen(test_functions[i].name);
data/dropbear-2020.81/libtommath/bn_mp_fread.c:14:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   int ch = fgetc(stream);
data/dropbear-2020.81/libtommath/bn_mp_fread.c:17:12:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ch = fgetc(stream);
data/dropbear-2020.81/libtommath/bn_mp_fread.c:50:19:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   } while ((ch = fgetc(stream)) != EOF);
data/dropbear-2020.81/libtommath/bn_s_mp_rand_platform.c:99:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ssize_t ret = read(fd, p, n);
data/dropbear-2020.81/loginrec.c:393:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strncmp(src, "/dev/", 5) == 0) || (dstsize < (strlen(src) + 5))) {
data/dropbear-2020.81/loginrec.c:436:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(src);
data/dropbear-2020.81/loginrec.c:443:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(dst, src, (size_t)dstsize);
data/dropbear-2020.81/loginrec.c:522:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(ut->ut_name, li->username, MIN_SIZEOF(ut->ut_name, li->username));
data/dropbear-2020.81/loginrec.c:524:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(ut->ut_host, li->hostname, MIN_SIZEOF(ut->ut_host, li->hostname));
data/dropbear-2020.81/loginrec.c:593:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(utx->ut_name, li->username, MIN_SIZEOF(utx->ut_name, li->username));
data/dropbear-2020.81/loginrec.c:604:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(utx->ut_host, li->hostname, MIN_SIZEOF(utx->ut_host, li->hostname));
data/dropbear-2020.81/loginrec.c:626:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	utx->ut_syslen = MIN(strlen(li->hostname), sizeof(utx->ut_host));
data/dropbear-2020.81/loginrec.c:701:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (atomicio(read, fd, &old_ut, sizeof(old_ut)) == sizeof(old_ut) &&
data/dropbear-2020.81/loginrec.c:1005:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (atomicio(read, fd, &ut, sizeof(ut)) != sizeof(ut)) {
data/dropbear-2020.81/loginrec.c:1161:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (atomicio(read, fd, &utx, sizeof(utx)) != sizeof(utx)) {
data/dropbear-2020.81/netio.c:84:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				int len = 100 + strlen(gai_strerror(err));
data/dropbear-2020.81/netio.c:198:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = 100 + strlen(gai_strerror(err));
data/dropbear-2020.81/netio.c:481:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = 20 + strlen(gai_strerror(err));
data/dropbear-2020.81/netio.c:579:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = 20 + strlen(strerror(err));
data/dropbear-2020.81/packet.c:183:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		len = read(ses.sock_in, buf_getptr(ses.readbuf, maxlen), maxlen);
data/dropbear-2020.81/packet.c:234:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	slen = read(ses.sock_in, buf_getwriteptr(ses.readbuf, maxlen),
data/dropbear-2020.81/progressmeter.c:168:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(buf + strlen(buf), win_size - strlen(buf),
data/dropbear-2020.81/progressmeter.c:168:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(buf + strlen(buf), win_size - strlen(buf),
data/dropbear-2020.81/progressmeter.c:172:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	format_size(buf + strlen(buf), win_size - strlen(buf),
data/dropbear-2020.81/progressmeter.c:172:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	format_size(buf + strlen(buf), win_size - strlen(buf),
data/dropbear-2020.81/progressmeter.c:177:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	format_rate(buf + strlen(buf), win_size - strlen(buf),
data/dropbear-2020.81/progressmeter.c:177:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	format_rate(buf + strlen(buf), win_size - strlen(buf),
data/dropbear-2020.81/progressmeter.c:203:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			snprintf(buf + strlen(buf), win_size - strlen(buf),
data/dropbear-2020.81/progressmeter.c:203:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			snprintf(buf + strlen(buf), win_size - strlen(buf),
data/dropbear-2020.81/progressmeter.c:206:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			snprintf(buf + strlen(buf), win_size - strlen(buf),
data/dropbear-2020.81/progressmeter.c:206:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			snprintf(buf + strlen(buf), win_size - strlen(buf),
data/dropbear-2020.81/scp.c:531:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(targ) + CMDNEEDS + 20;
data/dropbear-2020.81/scp.c:584:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(src) + CMDNEEDS + 20;
data/dropbear-2020.81/scp.c:614:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(name);
data/dropbear-2020.81/scp.c:654:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(void) atomicio(vwrite, remout, buf, strlen(buf));
data/dropbear-2020.81/scp.c:665:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(void) atomicio(vwrite, remout, buf, strlen(buf));
data/dropbear-2020.81/scp.c:685:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				result = atomicio(read, fd, bp->buf, amt);
data/dropbear-2020.81/scp.c:738:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(void) atomicio(vwrite, remout, path, strlen(path));
data/dropbear-2020.81/scp.c:748:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(void) atomicio(vwrite, remout, path, strlen(path));
data/dropbear-2020.81/scp.c:758:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(name) + 1 + strlen(dp->d_name) >= sizeof(path) - 1) {
data/dropbear-2020.81/scp.c:758:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(name) + 1 + strlen(dp->d_name) >= sizeof(path) - 1) {
data/dropbear-2020.81/scp.c:847:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask(0);
data/dropbear-2020.81/scp.c:849:10:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		(void) umask(mask);
data/dropbear-2020.81/scp.c:863:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (atomicio(read, remin, cp, 1) != 1)
data/dropbear-2020.81/scp.c:868:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (atomicio(read, remin, &ch, sizeof(ch)) != sizeof(ch))
data/dropbear-2020.81/scp.c:879:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				    buf + 1, strlen(buf + 1));
data/dropbear-2020.81/scp.c:948:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			need = strlen(targ) + strlen(cp) + 250;
data/dropbear-2020.81/scp.c:948:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			need = strlen(targ) + strlen(cp) + 250;
data/dropbear-2020.81/scp.c:1019:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				j = atomicio(read, remin, cp, amt);
data/dropbear-2020.81/scp.c:1116:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (atomicio(read, remin, &resp, sizeof(resp)) != sizeof(resp))
data/dropbear-2020.81/scp.c:1129:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (atomicio(read, remin, &ch, sizeof(ch)) != sizeof(ch))
data/dropbear-2020.81/scpmisc.c:103:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(str) + 1;
data/dropbear-2020.81/scpmisc.c:112:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (*host == '[' && host[strlen(host) - 1] == ']') {
data/dropbear-2020.81/scpmisc.c:113:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		host[strlen(host) - 1] = '\0';
data/dropbear-2020.81/signkey.c:72:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*namelen = strlen(signkey_names[type]);
data/dropbear-2020.81/signkey.c:82:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (namelen == strlen(fixed_name)
data/dropbear-2020.81/signkey.c:118:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*namelen = strlen(SSH_SIGNATURE_RSA_SHA256);
data/dropbear-2020.81/signkey.c:126:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*namelen = strlen(SSH_SIGNKEY_RSA);
data/dropbear-2020.81/signkey.c:137:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (namelen == strlen(SSH_SIGNATURE_RSA_SHA256) 
data/dropbear-2020.81/signkey.c:143:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (namelen == strlen(SSH_SIGNKEY_RSA) 
data/dropbear-2020.81/sshpty.c:189:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int num_minors = strlen(ptyminors);
data/dropbear-2020.81/sshpty.c:190:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int num_ptys = strlen(ptymajors) * num_minors;
data/dropbear-2020.81/svr-agentfwd.c:131:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(chansess->agentdir) + strlen(chansess->agentfile) + 2;
data/dropbear-2020.81/svr-agentfwd.c:131:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(chansess->agentdir) + strlen(chansess->agentfile) + 2;
data/dropbear-2020.81/svr-agentfwd.c:166:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(chansess->agentdir) + strlen(chansess->agentfile) + 2;
data/dropbear-2020.81/svr-agentfwd.c:166:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(chansess->agentdir) + strlen(chansess->agentfile) + 2;
data/dropbear-2020.81/svr-auth.c:243:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(username) != userlen) {
data/dropbear-2020.81/svr-authpam.c:75:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	msg_len = strlen(compare_message);
data/dropbear-2020.81/svr-authpam.c:111:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			m_burn(userDatap->passwd, strlen(userDatap->passwd));
data/dropbear-2020.81/svr-authpasswd.c:39:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t la = strlen(a);
data/dropbear-2020.81/svr-authpasswd.c:40:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t lb = strlen(b);
data/dropbear-2020.81/svr-authpubkey.c:146:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        .len = strlen(options_buf),
data/dropbear-2020.81/svr-authpubkey.c:391:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(ses.authstate.pw_dir);
data/dropbear-2020.81/svr-authpubkey.c:473:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((len = strlen(ses.authstate.pw_dir)) == 0) {
data/dropbear-2020.81/svr-authpubkeyoptions.c:123:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const unsigned int len = strlen(opt_name);
data/dropbear-2020.81/svr-chansession.c:231:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(ses.writepayload, signame, strlen(signame));
data/dropbear-2020.81/svr-chansession.c:632:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(local_ip) + strlen(remote_ip) + 20;
data/dropbear-2020.81/svr-chansession.c:632:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(local_ip) + strlen(remote_ip) + 20;
data/dropbear-2020.81/svr-chansession.c:638:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(remote_ip) + 20;
data/dropbear-2020.81/svr-chansession.c:852:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(ses.authstate.pw_dir) + 12; 
data/dropbear-2020.81/svr-chansession.c:1053:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	plen = strlen(param);
data/dropbear-2020.81/svr-chansession.c:1054:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	vlen = strlen(var);
data/dropbear-2020.81/svr-kex.c:264:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_putstring(ses.writepayload, SSH_SERVER_SIG_ALGS, strlen(SSH_SERVER_SIG_ALGS));
data/dropbear-2020.81/svr-session.c:119:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(host) + strlen(port) + 2;
data/dropbear-2020.81/svr-session.c:119:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(host) + strlen(port) + 2;
data/dropbear-2020.81/svr-x11fwd.c:230:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buf_putstring(ses.writepayload, ipstring, strlen(ipstring));
data/dropbear-2020.81/tcp-accept.c:97:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buf_putstring(ses.writepayload, addr, strlen(addr));
data/dropbear-2020.81/tcp-accept.c:101:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buf_putstring(ses.writepayload, ipstring, strlen(ipstring));

ANALYSIS SUMMARY:

Hits = 1145
Lines analyzed = 140973 in approximately 6.35 seconds (22209 lines/second)
Physical Source Lines of Code (SLOC) = 96330
Hits@level = [0] 1736 [1] 282 [2] 784 [3]  33 [4]  38 [5]   8
Hits@level+ = [0+] 2881 [1+] 1145 [2+] 863 [3+]  79 [4+]  46 [5+]   8
Hits/KSLOC@level+ = [0+] 29.9076 [1+] 11.8862 [2+] 8.95879 [3+] 0.820098 [4+] 0.477525 [5+] 0.0830479
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.