Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/efl-1.25.1/data/coverity/model.c
Examining data/efl-1.25.1/doc/previews/preview_text_filter.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_actionslider.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_bg.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_box.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_bubble1.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_bubble2.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_bubble3.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_button1.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_button2.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_button3.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_calendar.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_check1.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_check2.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_check3.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_clock.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_colorselector.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_combobox.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_conformant.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_ctxpopup.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_datetime1.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_datetime2.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_datetime3.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_dayselector.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_diskselector.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_entry1.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_entry2.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_entry3.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_entry4.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_fileselector.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_fileselector_button1.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_fileselector_button2.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_fileselector_button3.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_fileselector_entry.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_flip.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_flipselector.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_frame.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_gengrid.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_genlist1.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_genlist2.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_genlist3.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_genlist4.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_genlist5.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_hover.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_hoversel.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_icon.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_image.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_index.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_inwin1.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_inwin2.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_inwin3.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_label.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_layout.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_list.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_map.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_mapbuf.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_menu.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_notify.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_panel.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_panes.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_photocam.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_popup.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_prefs.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_progressbar.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_radio.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_scroller.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_segment_control.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_separator.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_slider.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_slideshow.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_spinner.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_table.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_thumb.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_tmpl_foot.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_tmpl_head.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_toolbar.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_web.c
Examining data/efl-1.25.1/doc/widgets/widget_preview_win.c
Examining data/efl-1.25.1/src/benchmarks/eina/Ecore_Data.h
Examining data/efl-1.25.1/src/benchmarks/eina/Evas_Data.h
Examining data/efl-1.25.1/src/benchmarks/eina/city.cc
Examining data/efl-1.25.1/src/benchmarks/eina/city.h
Examining data/efl-1.25.1/src/benchmarks/eina/ecore_list.c
Examining data/efl-1.25.1/src/benchmarks/eina/ecore_sheap.c
Examining data/efl-1.25.1/src/benchmarks/eina/eina_bench.c
Examining data/efl-1.25.1/src/benchmarks/eina/eina_bench.h
Examining data/efl-1.25.1/src/benchmarks/eina/eina_bench_array.c
Examining data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c
Examining data/efl-1.25.1/src/benchmarks/eina/eina_bench_crc_hash.c
Examining data/efl-1.25.1/src/benchmarks/eina/eina_bench_mempool.c
Examining data/efl-1.25.1/src/benchmarks/eina/eina_bench_quad.c
Examining data/efl-1.25.1/src/benchmarks/eina/eina_bench_rectangle_pool.c
Examining data/efl-1.25.1/src/benchmarks/eina/eina_bench_sort.c
Examining data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c
Examining data/efl-1.25.1/src/benchmarks/eina/evas_hash.c
Examining data/efl-1.25.1/src/benchmarks/eina/evas_list.c
Examining data/efl-1.25.1/src/benchmarks/eina/evas_mempool.c
Examining data/efl-1.25.1/src/benchmarks/eina/evas_mempool.h
Examining data/efl-1.25.1/src/benchmarks/eina/evas_object_list.c
Examining data/efl-1.25.1/src/benchmarks/eina/evas_stringshare.c
Examining data/efl-1.25.1/src/benchmarks/elementary/collection.c
Examining data/efl-1.25.1/src/benchmarks/elementary/focus_widget_tree.c
Examining data/efl-1.25.1/src/benchmarks/eo/class_simple.c
Examining data/efl-1.25.1/src/benchmarks/eo/class_simple.h
Examining data/efl-1.25.1/src/benchmarks/eo/eo_bench.c
Examining data/efl-1.25.1/src/benchmarks/eo/eo_bench.h
Examining data/efl-1.25.1/src/benchmarks/eo/eo_bench_callbacks.c
Examining data/efl-1.25.1/src/benchmarks/eo/eo_bench_eo_add.c
Examining data/efl-1.25.1/src/benchmarks/eo/eo_bench_eo_do.c
Examining data/efl-1.25.1/src/benchmarks/evas/evas_bench.c
Examining data/efl-1.25.1/src/benchmarks/evas/evas_bench.h
Examining data/efl-1.25.1/src/benchmarks/evas/evas_bench_loader.c
Examining data/efl-1.25.1/src/benchmarks/evas/evas_bench_saver.c
Examining data/efl-1.25.1/src/bin/ecore_buffer/bq_mgr.c
Examining data/efl-1.25.1/src/bin/ecore_buffer/bq_mgr_protocol.c
Examining data/efl-1.25.1/src/bin/ecore_buffer/bq_mgr_protocol.h
Examining data/efl-1.25.1/src/bin/ecore_con/efl_net_proxy_helper.c
Examining data/efl-1.25.1/src/bin/ecore_evas/ecore_evas_convert.c
Examining data/efl-1.25.1/src/bin/ecore_evas/eetpack.c
Examining data/efl-1.25.1/src/bin/edje/edje_cc.c
Examining data/efl-1.25.1/src/bin/edje/edje_cc.h
Examining data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c
Examining data/efl-1.25.1/src/bin/edje/edje_cc_mem.c
Examining data/efl-1.25.1/src/bin/edje/edje_cc_out.c
Examining data/efl-1.25.1/src/bin/edje/edje_cc_parse.c
Examining data/efl-1.25.1/src/bin/edje/edje_cc_script.c
Examining data/efl-1.25.1/src/bin/edje/edje_cc_sources.c
Examining data/efl-1.25.1/src/bin/edje/edje_codegen.c
Examining data/efl-1.25.1/src/bin/edje/edje_convert.c
Examining data/efl-1.25.1/src/bin/edje/edje_convert.h
Examining data/efl-1.25.1/src/bin/edje/edje_convert_main.c
Examining data/efl-1.25.1/src/bin/edje/edje_data_convert.c
Examining data/efl-1.25.1/src/bin/edje/edje_decc.c
Examining data/efl-1.25.1/src/bin/edje/edje_decc.h
Examining data/efl-1.25.1/src/bin/edje/edje_external_inspector.c
Examining data/efl-1.25.1/src/bin/edje/edje_inspector.c
Examining data/efl-1.25.1/src/bin/edje/edje_multisense_convert.c
Examining data/efl-1.25.1/src/bin/edje/edje_multisense_convert.h
Examining data/efl-1.25.1/src/bin/edje/edje_pick.c
Examining data/efl-1.25.1/src/bin/edje/edje_player.c
Examining data/efl-1.25.1/src/bin/edje/edje_watch.c
Examining data/efl-1.25.1/src/bin/edje/epp/cppalloc.c
Examining data/efl-1.25.1/src/bin/edje/epp/cpperror.c
Examining data/efl-1.25.1/src/bin/edje/epp/cppexp.c
Examining data/efl-1.25.1/src/bin/edje/epp/cpphash.c
Examining data/efl-1.25.1/src/bin/edje/epp/cpphash.h
Examining data/efl-1.25.1/src/bin/edje/epp/cpplib.c
Examining data/efl-1.25.1/src/bin/edje/epp/cpplib.h
Examining data/efl-1.25.1/src/bin/edje/epp/cppmain.c
Examining data/efl-1.25.1/src/bin/eet/eet_main.c
Examining data/efl-1.25.1/src/bin/eeze/eeze_disk_ls/eeze_disk_ls.c
Examining data/efl-1.25.1/src/bin/eeze/eeze_mount/eeze_mount.c
Examining data/efl-1.25.1/src/bin/eeze/eeze_scanner/eeze_scanner.c
Examining data/efl-1.25.1/src/bin/eeze/eeze_scanner/eeze_scanner.h
Examining data/efl-1.25.1/src/bin/eeze/eeze_scanner_monitor/eeze_scanner_monitor.c
Examining data/efl-1.25.1/src/bin/eeze/eeze_sensor_test/eeze_sensor_test.c
Examining data/efl-1.25.1/src/bin/eeze/eeze_udev_test/eeze_udev_test.c
Examining data/efl-1.25.1/src/bin/eeze/eeze_umount/eeze_umount.c
Examining data/efl-1.25.1/src/bin/efl/efl_debug.c
Examining data/efl-1.25.1/src/bin/efl/efl_debugd.c
Examining data/efl-1.25.1/src/bin/efl_canvas_wl/efl_canvas_wl_test.c
Examining data/efl-1.25.1/src/bin/efl_canvas_wl/efl_canvas_wl_test_stack.c
Examining data/efl-1.25.1/src/bin/efl_js/launcher_main.cc
Examining data/efl-1.25.1/src/bin/efl_mono_msbuild_gen/main.cc
Examining data/efl-1.25.1/src/bin/efreet/efreet_desktop_cache_create.c
Examining data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c
Examining data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c
Examining data/efl-1.25.1/src/bin/efreet/efreetd.c
Examining data/efl-1.25.1/src/bin/efreet/efreetd.h
Examining data/efl-1.25.1/src/bin/efreet/efreetd_cache.c
Examining data/efl-1.25.1/src/bin/efreet/efreetd_cache.h
Examining data/efl-1.25.1/src/bin/efreet/efreetd_ipc.c
Examining data/efl-1.25.1/src/bin/efreet/efreetd_ipc.h
Examining data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c
Examining data/efl-1.25.1/src/bin/eina/eina_modinfo/eina_modinfo.c
Examining data/efl-1.25.1/src/bin/eldbus/client.c
Examining data/efl-1.25.1/src/bin/eldbus/codegen.h
Examining data/efl-1.25.1/src/bin/eldbus/dbus.c
Examining data/efl-1.25.1/src/bin/eldbus/parser.c
Examining data/efl-1.25.1/src/bin/eldbus/source_client.c
Examining data/efl-1.25.1/src/bin/eldbus/utils.c
Examining data/efl-1.25.1/src/bin/elementary/config.c
Examining data/efl-1.25.1/src/bin/elementary/elementary_codegen.c
Examining data/efl-1.25.1/src/bin/elementary/elm_prefs_cc.c
Examining data/efl-1.25.1/src/bin/elementary/elm_prefs_cc.h
Examining data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_handlers.c
Examining data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_mem.c
Examining data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_out.c
Examining data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c
Examining data/efl-1.25.1/src/bin/elementary/perf.c
Examining data/efl-1.25.1/src/bin/elementary/perf.h
Examining data/efl-1.25.1/src/bin/elementary/perf_list.c
Examining data/efl-1.25.1/src/bin/elementary/perf_rnd.c
Examining data/efl-1.25.1/src/bin/elementary/perf_test_01.c
Examining data/efl-1.25.1/src/bin/elementary/perf_test_02.c
Examining data/efl-1.25.1/src/bin/elementary/perf_test_03.c
Examining data/efl-1.25.1/src/bin/elementary/perf_test_04.c
Examining data/efl-1.25.1/src/bin/elementary/perf_test_05.c
Examining data/efl-1.25.1/src/bin/elementary/perf_test_06.c
Examining data/efl-1.25.1/src/bin/elementary/quicklaunch.c
Examining data/efl-1.25.1/src/bin/elementary/run.c
Examining data/efl-1.25.1/src/bin/elementary/test.c
Examining data/efl-1.25.1/src/bin/elementary/test.h
Examining data/efl-1.25.1/src/bin/elementary/test_3d.c
Examining data/efl-1.25.1/src/bin/elementary/test_access.c
Examining data/efl-1.25.1/src/bin/elementary/test_actionslider.c
Examining data/efl-1.25.1/src/bin/elementary/test_anim.c
Examining data/efl-1.25.1/src/bin/elementary/test_bg.c
Examining data/efl-1.25.1/src/bin/elementary/test_box.c
Examining data/efl-1.25.1/src/bin/elementary/test_bubble.c
Examining data/efl-1.25.1/src/bin/elementary/test_button.c
Examining data/efl-1.25.1/src/bin/elementary/test_calendar.c
Examining data/efl-1.25.1/src/bin/elementary/test_canvas_textblock.c
Examining data/efl-1.25.1/src/bin/elementary/test_check.c
Examining data/efl-1.25.1/src/bin/elementary/test_clock.c
Examining data/efl-1.25.1/src/bin/elementary/test_cnp.c
Examining data/efl-1.25.1/src/bin/elementary/test_code.c
Examining data/efl-1.25.1/src/bin/elementary/test_colorclass.c
Examining data/efl-1.25.1/src/bin/elementary/test_colorselector.c
Examining data/efl-1.25.1/src/bin/elementary/test_combobox.c
Examining data/efl-1.25.1/src/bin/elementary/test_config.c
Examining data/efl-1.25.1/src/bin/elementary/test_conform.c
Examining data/efl-1.25.1/src/bin/elementary/test_conform_indicator.c
Examining data/efl-1.25.1/src/bin/elementary/test_ctxpopup.c
Examining data/efl-1.25.1/src/bin/elementary/test_cursor.c
Examining data/efl-1.25.1/src/bin/elementary/test_datetime.c
Examining data/efl-1.25.1/src/bin/elementary/test_dayselector.c
Examining data/efl-1.25.1/src/bin/elementary/test_disable.c
Examining data/efl-1.25.1/src/bin/elementary/test_diskselector.c
Examining data/efl-1.25.1/src/bin/elementary/test_dnd.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_anim_alpha.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_anim_group_parallel.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_anim_group_sequential.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_anim_interpolator.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_anim_pause.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_anim_repeat.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_anim_rotate.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_anim_scale.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_anim_start_delay.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_anim_translate.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_gfx_mapping.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_ui_text.c
Examining data/efl-1.25.1/src/bin/elementary/test_efl_ui_vg_animation.c
Examining data/efl-1.25.1/src/bin/elementary/test_eio.c
Examining data/efl-1.25.1/src/bin/elementary/test_entry.c
Examining data/efl-1.25.1/src/bin/elementary/test_entry_anchor.c
Examining data/efl-1.25.1/src/bin/elementary/test_entry_anchor2.c
Examining data/efl-1.25.1/src/bin/elementary/test_evas_map.c
Examining data/efl-1.25.1/src/bin/elementary/test_evas_mask.c
Examining data/efl-1.25.1/src/bin/elementary/test_evas_snapshot.c
Examining data/efl-1.25.1/src/bin/elementary/test_events.c
Examining data/efl-1.25.1/src/bin/elementary/test_explode.c
Examining data/efl-1.25.1/src/bin/elementary/test_explode.h
Examining data/efl-1.25.1/src/bin/elementary/test_external.c
Examining data/efl-1.25.1/src/bin/elementary/test_factory.c
Examining data/efl-1.25.1/src/bin/elementary/test_fileselector.c
Examining data/efl-1.25.1/src/bin/elementary/test_fileselector_button.c
Examining data/efl-1.25.1/src/bin/elementary/test_fileselector_entry.c
Examining data/efl-1.25.1/src/bin/elementary/test_flip.c
Examining data/efl-1.25.1/src/bin/elementary/test_flip_page.c
Examining data/efl-1.25.1/src/bin/elementary/test_flip_page_eo.c
Examining data/efl-1.25.1/src/bin/elementary/test_flipselector.c
Examining data/efl-1.25.1/src/bin/elementary/test_floating.c
Examining data/efl-1.25.1/src/bin/elementary/test_focus.c
Examining data/efl-1.25.1/src/bin/elementary/test_focus_custom_chain.c
Examining data/efl-1.25.1/src/bin/elementary/test_focus_policy.c
Examining data/efl-1.25.1/src/bin/elementary/test_focus_style.c
Examining data/efl-1.25.1/src/bin/elementary/test_gengrid.c
Examining data/efl-1.25.1/src/bin/elementary/test_genlist.c
Examining data/efl-1.25.1/src/bin/elementary/test_gesture_framework.c
Examining data/efl-1.25.1/src/bin/elementary/test_gesture_layer.c
Examining data/efl-1.25.1/src/bin/elementary/test_gesture_layer2.c
Examining data/efl-1.25.1/src/bin/elementary/test_gesture_layer3.c
Examining data/efl-1.25.1/src/bin/elementary/test_gfx_filters.c
Examining data/efl-1.25.1/src/bin/elementary/test_glview.c
Examining data/efl-1.25.1/src/bin/elementary/test_glview_manygears.c
Examining data/efl-1.25.1/src/bin/elementary/test_glview_simple.c
Examining data/efl-1.25.1/src/bin/elementary/test_grid.c
Examining data/efl-1.25.1/src/bin/elementary/test_hover.c
Examining data/efl-1.25.1/src/bin/elementary/test_hoversel.c
Examining data/efl-1.25.1/src/bin/elementary/test_icon.c
Examining data/efl-1.25.1/src/bin/elementary/test_icon_animated.c
Examining data/efl-1.25.1/src/bin/elementary/test_icon_desktops.c
Examining data/efl-1.25.1/src/bin/elementary/test_image.c
Examining data/efl-1.25.1/src/bin/elementary/test_index.c
Examining data/efl-1.25.1/src/bin/elementary/test_inwin.c
Examining data/efl-1.25.1/src/bin/elementary/test_label.c
Examining data/efl-1.25.1/src/bin/elementary/test_launcher.c
Examining data/efl-1.25.1/src/bin/elementary/test_layout.c
Examining data/efl-1.25.1/src/bin/elementary/test_list.c
Examining data/efl-1.25.1/src/bin/elementary/test_main_menu.c
Examining data/efl-1.25.1/src/bin/elementary/test_map.c
Examining data/efl-1.25.1/src/bin/elementary/test_menu.c
Examining data/efl-1.25.1/src/bin/elementary/test_multi.c
Examining data/efl-1.25.1/src/bin/elementary/test_multibuttonentry.c
Examining data/efl-1.25.1/src/bin/elementary/test_naviframe.c
Examining data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c
Examining data/efl-1.25.1/src/bin/elementary/test_notify.c
Examining data/efl-1.25.1/src/bin/elementary/test_panel.c
Examining data/efl-1.25.1/src/bin/elementary/test_panes.c
Examining data/efl-1.25.1/src/bin/elementary/test_part_bg.c
Examining data/efl-1.25.1/src/bin/elementary/test_part_shadow.c
Examining data/efl-1.25.1/src/bin/elementary/test_photo.c
Examining data/efl-1.25.1/src/bin/elementary/test_photocam.c
Examining data/efl-1.25.1/src/bin/elementary/test_popup.c
Examining data/efl-1.25.1/src/bin/elementary/test_prefs.c
Examining data/efl-1.25.1/src/bin/elementary/test_progressbar.c
Examining data/efl-1.25.1/src/bin/elementary/test_radio.c
Examining data/efl-1.25.1/src/bin/elementary/test_scaling.c
Examining data/efl-1.25.1/src/bin/elementary/test_scroller.c
Examining data/efl-1.25.1/src/bin/elementary/test_segment_control.c
Examining data/efl-1.25.1/src/bin/elementary/test_separator.c
Examining data/efl-1.25.1/src/bin/elementary/test_slider.c
Examining data/efl-1.25.1/src/bin/elementary/test_slideshow.c
Examining data/efl-1.25.1/src/bin/elementary/test_spinner.c
Examining data/efl-1.25.1/src/bin/elementary/test_store.c
Examining data/efl-1.25.1/src/bin/elementary/test_sys_notify.c
Examining data/efl-1.25.1/src/bin/elementary/test_systray.c
Examining data/efl-1.25.1/src/bin/elementary/test_table.c
Examining data/efl-1.25.1/src/bin/elementary/test_thumb.c
Examining data/efl-1.25.1/src/bin/elementary/test_toolbar.c
Examining data/efl-1.25.1/src/bin/elementary/test_tooltip.c
Examining data/efl-1.25.1/src/bin/elementary/test_transit.c
Examining data/efl-1.25.1/src/bin/elementary/test_transit_bezier.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_box.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_box_stack.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_button.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_clock.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_collection.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_collection_view.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_datepicker.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_frame.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_image.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_items.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_pager.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_pager_scroll.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_panel.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_panes.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_popup.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_progressbar.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_radio.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_relative_container.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_scroller.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_separator.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_slider.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_slider_interval.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_spin.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_spin_button.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_spotlight.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_stack.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_tab_pager.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_table.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_table_static.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_tags.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_textpath.c
Examining data/efl-1.25.1/src/bin/elementary/test_ui_timepicker.c
Examining data/efl-1.25.1/src/bin/elementary/test_video.c
Examining data/efl-1.25.1/src/bin/elementary/test_weather.c
Examining data/efl-1.25.1/src/bin/elementary/test_web.c
Examining data/efl-1.25.1/src/bin/elementary/test_win_dialog.c
Examining data/efl-1.25.1/src/bin/elementary/test_win_indicator.c
Examining data/efl-1.25.1/src/bin/elementary/test_win_inline.c
Examining data/efl-1.25.1/src/bin/elementary/test_win_keygrab.c
Examining data/efl-1.25.1/src/bin/elementary/test_win_modal.c
Examining data/efl-1.25.1/src/bin/elementary/test_win_plug.c
Examining data/efl-1.25.1/src/bin/elementary/test_win_socket.c
Examining data/efl-1.25.1/src/bin/elementary/test_win_stack.c
Examining data/efl-1.25.1/src/bin/elementary/test_win_state.c
Examining data/efl-1.25.1/src/bin/elementary/test_win_wm_rotation.c
Examining data/efl-1.25.1/src/bin/elua/main.c
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_amx.h
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_osdefs.h
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_prefix.c
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_prefix.h
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_sc.h
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_sc4.c
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_sc5.c
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_scexpand.c
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_sclist.c
Examining data/efl-1.25.1/src/bin/embryo/embryo_cc_scvars.c
Examining data/efl-1.25.1/src/bin/eolian/docs.c
Examining data/efl-1.25.1/src/bin/eolian/docs.h
Examining data/efl-1.25.1/src/bin/eolian/headers.c
Examining data/efl-1.25.1/src/bin/eolian/headers.h
Examining data/efl-1.25.1/src/bin/eolian/main.c
Examining data/efl-1.25.1/src/bin/eolian/main.h
Examining data/efl-1.25.1/src/bin/eolian/sources.c
Examining data/efl-1.25.1/src/bin/eolian/sources.h
Examining data/efl-1.25.1/src/bin/eolian/types.c
Examining data/efl-1.25.1/src/bin/eolian/types.h
Examining data/efl-1.25.1/src/bin/eolian_cxx/eolian_cxx.cc
Examining data/efl-1.25.1/src/bin/eolian_js/main.cc
Examining data/efl-1.25.1/src/bin/eolian_mono/eolian_mono.cc
Examining data/efl-1.25.1/src/bin/ethumb/ethumb.c
Examining data/efl-1.25.1/src/bin/ethumb_client/ethumbd.c
Examining data/efl-1.25.1/src/bin/ethumb_client/ethumbd_client.c
Examining data/efl-1.25.1/src/bin/ethumb_client/ethumbd_private.h
Examining data/efl-1.25.1/src/bin/ethumb_client/ethumbd_slave.c
Examining data/efl-1.25.1/src/bin/exactness/common.c
Examining data/efl-1.25.1/src/bin/exactness/common.h
Examining data/efl-1.25.1/src/bin/exactness/exactness.c
Examining data/efl-1.25.1/src/bin/exactness/injector.c
Examining data/efl-1.25.1/src/bin/exactness/inspect.c
Examining data/efl-1.25.1/src/bin/exactness/player.c
Examining data/efl-1.25.1/src/bin/exactness/recorder.c
Examining data/efl-1.25.1/src/bindings/js/ecore_js/ecore_js_animator.cc
Examining data/efl-1.25.1/src/bindings/js/ecore_js/ecore_js_event.cc
Examining data/efl-1.25.1/src/bindings/js/ecore_js/ecore_js_idle.cc
Examining data/efl-1.25.1/src/bindings/js/ecore_js/ecore_js_init.cc
Examining data/efl-1.25.1/src/bindings/js/ecore_js/ecore_js_job.cc
Examining data/efl-1.25.1/src/bindings/js/ecore_js/ecore_js_mainloop.cc
Examining data/efl-1.25.1/src/bindings/js/ecore_js/ecore_js_poller.cc
Examining data/efl-1.25.1/src/bindings/js/ecore_js/ecore_js_throttle.cc
Examining data/efl-1.25.1/src/bindings/js/ecore_js/ecore_js_timer.cc
Examining data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc
Examining data/efl-1.25.1/src/bindings/js/eina_js/eina_js_accessor.cc
Examining data/efl-1.25.1/src/bindings/js/eina_js/eina_js_compatibility.cc
Examining data/efl-1.25.1/src/bindings/js/eina_js/eina_js_container.cc
Examining data/efl-1.25.1/src/bindings/js/eina_js/eina_js_error.cc
Examining data/efl-1.25.1/src/bindings/js/eina_js/eina_js_iterator.cc
Examining data/efl-1.25.1/src/bindings/js/eina_js/eina_js_log.cc
Examining data/efl-1.25.1/src/bindings/js/eina_js/eina_js_value.cc
Examining data/efl-1.25.1/src/bindings/js/eio_js/eio_js.cc
Examining data/efl-1.25.1/src/bindings/js/eldbus_js/eldbus_js_connection.cc
Examining data/efl-1.25.1/src/bindings/js/eldbus_js/eldbus_js_core.cc
Examining data/efl-1.25.1/src/bindings/js/eldbus_js/eldbus_js_message.cc
Examining data/efl-1.25.1/src/bindings/js/eldbus_js/eldbus_js_object_mapper.cc
Examining data/efl-1.25.1/src/bindings/js/ethumb_js/ethumb_js_client.cc
Examining data/efl-1.25.1/src/edje_external/elementary/elm.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_actionslider.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_bg.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_bubble.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_button.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_calendar.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_check.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_clock.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_combobox.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_entry.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_fileselector.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_fileselector_button.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_fileselector_entry.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_frame.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_gengrid.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_genlist.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_hoversel.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_icon.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_index.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_label.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_list.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_map.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_multibuttonentry.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_naviframe.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_notify.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_panes.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_photocam.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_progressbar.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_radio.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_scroller.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_segment_control.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_slider.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_slideshow.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_spinner.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_thumb.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_toolbar.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_video.c
Examining data/efl-1.25.1/src/edje_external/elementary/elm_web.c
Examining data/efl-1.25.1/src/edje_external/elementary/private.h
Examining data/efl-1.25.1/src/edje_external/emotion/emotion.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_animator_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_audio_custom.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_audio_playback.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_audio_to_ogg.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_buffer_consumer_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_buffer_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_buffer_provider_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_client_bench.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_compose_get_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_client_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_client_simple_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_eet_client_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_eet_descriptor_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_eet_descriptor_example.h
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_eet_server_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_lookup_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_server_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_server_http_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_server_simple_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_url_cookies_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_url_download_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_url_ftp_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_con_url_headers_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_basics_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_buffer_example_01.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_buffer_example_02.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_callbacks.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_cursor_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_ews_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_extn_plug_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_extn_socket_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_object_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_vnc_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_wayland_multiseat_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_evas_window_sizes_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_event_example_01.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_event_example_02.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_exe_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_exe_example_child.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_fd_handler_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_fd_handler_gnutls_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_file_download_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_getopt_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_idler_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_imf_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_input_joystick_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_ipc_client_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_ipc_server_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_job_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_pipe_gstreamer_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_pipe_simple_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_poller_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_promise2_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_server_bench.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_thread_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_time_functions_example.c
Examining data/efl-1.25.1/src/examples/ecore/ecore_timer_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_exe.c
Examining data/efl-1.25.1/src/examples/ecore/efl_io_buffered_stream_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_io_copier_simple_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_io_queue_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_control_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_dialer_http_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_dialer_simple_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_dialer_udp_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_dialer_unix_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_dialer_websocket_autobahntestee.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_dialer_websocket_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_dialer_windows_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_ip_address_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_server_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_server_simple_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_session_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_socket_ssl_dialer_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_net_socket_ssl_server_example.c
Examining data/efl-1.25.1/src/examples/ecore/efl_thread.c
Examining data/efl-1.25.1/src/examples/ecore_avahi/ecore_avahi_browse_example.c
Examining data/efl-1.25.1/src/examples/ecore_avahi/ecore_avahi_example.c
Examining data/efl-1.25.1/src/examples/edje/animations2.c
Examining data/efl-1.25.1/src/examples/edje/edje-anchors.c
Examining data/efl-1.25.1/src/examples/edje/edje-animations.c
Examining data/efl-1.25.1/src/examples/edje/edje-basic.c
Examining data/efl-1.25.1/src/examples/edje/edje-basic2.c
Examining data/efl-1.25.1/src/examples/edje/edje-box.c
Examining data/efl-1.25.1/src/examples/edje/edje-box2.c
Examining data/efl-1.25.1/src/examples/edje/edje-codegen-example.c
Examining data/efl-1.25.1/src/examples/edje/edje-color-class.c
Examining data/efl-1.25.1/src/examples/edje/edje-drag.c
Examining data/efl-1.25.1/src/examples/edje/edje-dynamic-multiseat.c
Examining data/efl-1.25.1/src/examples/edje/edje-edit-part-box.c
Examining data/efl-1.25.1/src/examples/edje/edje-entry.c
Examining data/efl-1.25.1/src/examples/edje/edje-focus.c
Examining data/efl-1.25.1/src/examples/edje/edje-multiseat-custom-names.c
Examining data/efl-1.25.1/src/examples/edje/edje-multiseat-filter.c
Examining data/efl-1.25.1/src/examples/edje/edje-multiseat.c
Examining data/efl-1.25.1/src/examples/edje/edje-multisense.c
Examining data/efl-1.25.1/src/examples/edje/edje-perspective.c
Examining data/efl-1.25.1/src/examples/edje/edje-signals-messages.c
Examining data/efl-1.25.1/src/examples/edje/edje-swallow.c
Examining data/efl-1.25.1/src/examples/edje/edje-swallow2.c
Examining data/efl-1.25.1/src/examples/edje/edje-table.c
Examining data/efl-1.25.1/src/examples/edje/edje-text.c
Examining data/efl-1.25.1/src/examples/edje/edje-textblock-hyphenation.c
Examining data/efl-1.25.1/src/examples/edje/edje_example.c
Examining data/efl-1.25.1/src/examples/edje/signals2.c
Examining data/efl-1.25.1/src/examples/edje/sigtest.c
Examining data/efl-1.25.1/src/examples/edje/svg-test.c
Examining data/efl-1.25.1/src/examples/eet/eet-basic.c
Examining data/efl-1.25.1/src/examples/eet/eet-data-cipher_decipher.c
Examining data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_01.c
Examining data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c
Examining data/efl-1.25.1/src/examples/eet/eet-data-nested.c
Examining data/efl-1.25.1/src/examples/eet/eet-data-simple.c
Examining data/efl-1.25.1/src/examples/eet/eet-file.c
Examining data/efl-1.25.1/src/examples/efl_mono/example_numberwrapper.c
Examining data/efl-1.25.1/src/examples/eina/eina_accessor_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_array_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_array_02.c
Examining data/efl-1.25.1/src/examples/eina/eina_error_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_file_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_file_02.c
Examining data/efl-1.25.1/src/examples/eina/eina_hash_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_hash_02.c
Examining data/efl-1.25.1/src/examples/eina/eina_hash_03.c
Examining data/efl-1.25.1/src/examples/eina/eina_hash_04.c
Examining data/efl-1.25.1/src/examples/eina/eina_hash_05.c
Examining data/efl-1.25.1/src/examples/eina/eina_hash_06.c
Examining data/efl-1.25.1/src/examples/eina/eina_hash_07.c
Examining data/efl-1.25.1/src/examples/eina/eina_hash_08.c
Examining data/efl-1.25.1/src/examples/eina/eina_inarray_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_inarray_02.c
Examining data/efl-1.25.1/src/examples/eina/eina_inarray_03.c
Examining data/efl-1.25.1/src/examples/eina/eina_inlist_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_inlist_02.c
Examining data/efl-1.25.1/src/examples/eina/eina_inlist_03.c
Examining data/efl-1.25.1/src/examples/eina/eina_iterator_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_list_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_list_02.c
Examining data/efl-1.25.1/src/examples/eina/eina_list_03.c
Examining data/efl-1.25.1/src/examples/eina/eina_list_04.c
Examining data/efl-1.25.1/src/examples/eina/eina_log_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_log_02.c
Examining data/efl-1.25.1/src/examples/eina/eina_log_03.c
Examining data/efl-1.25.1/src/examples/eina/eina_magic_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_simple_xml_parser_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_simple_xml_parser_02.c
Examining data/efl-1.25.1/src/examples/eina/eina_str_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_strbuf_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_strbuf_02.c
Examining data/efl-1.25.1/src/examples/eina/eina_stringshare_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_tiler_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_tiler_02.c
Examining data/efl-1.25.1/src/examples/eina/eina_tmpstr_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_value_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_value_02.c
Examining data/efl-1.25.1/src/examples/eina/eina_value_03.c
Examining data/efl-1.25.1/src/examples/eina/eina_value_04.c
Examining data/efl-1.25.1/src/examples/eina/eina_xattr_01.c
Examining data/efl-1.25.1/src/examples/eina/eina_xattr_02.c
Examining data/efl-1.25.1/src/examples/eina_cxx/eina_cxx_list_01.cc
Examining data/efl-1.25.1/src/examples/eina_cxx/eina_cxx_thread_01.cc
Examining data/efl-1.25.1/src/examples/eio/efl_io_manager_ls.c
Examining data/efl-1.25.1/src/examples/eio/efl_io_manager_open.c
Examining data/efl-1.25.1/src/examples/eio/efl_io_manager_open_multi.c
Examining data/efl-1.25.1/src/examples/eio/eio_file_copy.c
Examining data/efl-1.25.1/src/examples/eio/eio_file_ls.c
Examining data/efl-1.25.1/src/examples/eio/eio_sentry.c
Examining data/efl-1.25.1/src/examples/eldbus/banshee.c
Examining data/efl-1.25.1/src/examples/eldbus/client.c
Examining data/efl-1.25.1/src/examples/eldbus/complex-types-client-eina-value.c
Examining data/efl-1.25.1/src/examples/eldbus/complex-types-server.c
Examining data/efl-1.25.1/src/examples/eldbus/complex-types.c
Examining data/efl-1.25.1/src/examples/eldbus/connect-address.c
Examining data/efl-1.25.1/src/examples/eldbus/connman-list-services.c
Examining data/efl-1.25.1/src/examples/eldbus/dbusmodel.c
Examining data/efl-1.25.1/src/examples/eldbus/ofono-dial.c
Examining data/efl-1.25.1/src/examples/eldbus/server.c
Examining data/efl-1.25.1/src/examples/eldbus/simple-signal-emit.c
Examining data/efl-1.25.1/src/examples/elementary/actionslider_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/bg_cxx_example_01.cc
Examining data/efl-1.25.1/src/examples/elementary/bg_cxx_example_02.cc
Examining data/efl-1.25.1/src/examples/elementary/bg_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/bg_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/bg_example_03.c
Examining data/efl-1.25.1/src/examples/elementary/box_cxx_example_02.cc
Examining data/efl-1.25.1/src/examples/elementary/box_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/bubble_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/button_cxx_example_00.cc
Examining data/efl-1.25.1/src/examples/elementary/button_cxx_example_01.cc
Examining data/efl-1.25.1/src/examples/elementary/button_example_00.c
Examining data/efl-1.25.1/src/examples/elementary/button_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/calendar_cxx_example_01.cc
Examining data/efl-1.25.1/src/examples/elementary/calendar_cxx_example_02.cc
Examining data/efl-1.25.1/src/examples/elementary/calendar_cxx_example_03.cc
Examining data/efl-1.25.1/src/examples/elementary/calendar_cxx_example_04.cc
Examining data/efl-1.25.1/src/examples/elementary/calendar_cxx_example_05.cc
Examining data/efl-1.25.1/src/examples/elementary/calendar_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/calendar_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/calendar_example_03.c
Examining data/efl-1.25.1/src/examples/elementary/calendar_example_04.c
Examining data/efl-1.25.1/src/examples/elementary/calendar_example_05.c
Examining data/efl-1.25.1/src/examples/elementary/calendar_example_06.c
Examining data/efl-1.25.1/src/examples/elementary/check_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/clock_cxx_example.cc
Examining data/efl-1.25.1/src/examples/elementary/clock_example.c
Examining data/efl-1.25.1/src/examples/elementary/codegen_example.c
Examining data/efl-1.25.1/src/examples/elementary/colorselector_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/combobox_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/conformant_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/conformant_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/ctxpopup_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/datetime_example.c
Examining data/efl-1.25.1/src/examples/elementary/dayselector_example.c
Examining data/efl-1.25.1/src/examples/elementary/diskselector_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/diskselector_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/efl_canvas_layout_text.c
Examining data/efl-1.25.1/src/examples/elementary/efl_canvas_textblock_obstacles_example.c
Examining data/efl-1.25.1/src/examples/elementary/efl_thread_1.c
Examining data/efl-1.25.1/src/examples/elementary/efl_thread_2.c
Examining data/efl-1.25.1/src/examples/elementary/efl_thread_3.c
Examining data/efl-1.25.1/src/examples/elementary/efl_thread_4.c
Examining data/efl-1.25.1/src/examples/elementary/efl_thread_5.c
Examining data/efl-1.25.1/src/examples/elementary/efl_thread_6.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_collection_view_example_1.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_grid_example_1.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_grid_view_example_1.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_list_example_1.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_list_view_example_1.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_list_view_example_2.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_list_view_example_3.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_radio_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_relative_container_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_relative_container_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_scroller_example.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_slideshow_example.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_theme_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/efl_ui_theme_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/entry_example.c
Examining data/efl-1.25.1/src/examples/elementary/filemvc.c
Examining data/efl-1.25.1/src/examples/elementary/fileselector_button_example.c
Examining data/efl-1.25.1/src/examples/elementary/fileselector_entry_example.c
Examining data/efl-1.25.1/src/examples/elementary/fileselector_example.c
Examining data/efl-1.25.1/src/examples/elementary/fileviewlist.c
Examining data/efl-1.25.1/src/examples/elementary/filter_example.c
Examining data/efl-1.25.1/src/examples/elementary/flip_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/flipselector_example.c
Examining data/efl-1.25.1/src/examples/elementary/frame_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/general_funcs_example.c
Examining data/efl-1.25.1/src/examples/elementary/gengrid_example.c
Examining data/efl-1.25.1/src/examples/elementary/genlist_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/genlist_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/genlist_example_03.c
Examining data/efl-1.25.1/src/examples/elementary/genlist_example_04.c
Examining data/efl-1.25.1/src/examples/elementary/genlist_example_05.c
Examining data/efl-1.25.1/src/examples/elementary/glview_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/hover_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/hoversel_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/icon_cxx_example_01.cc
Examining data/efl-1.25.1/src/examples/elementary/icon_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/image_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/image_webp_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/image_webp_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/index_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/index_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/inwin_example.c
Examining data/efl-1.25.1/src/examples/elementary/label_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/label_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/label_example_03.c
Examining data/efl-1.25.1/src/examples/elementary/layout_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/layout_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/layout_example_03.c
Examining data/efl-1.25.1/src/examples/elementary/layout_property_bind.c
Examining data/efl-1.25.1/src/examples/elementary/list_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/list_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/list_example_03.c
Examining data/efl-1.25.1/src/examples/elementary/map_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/map_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/map_example_03.c
Examining data/efl-1.25.1/src/examples/elementary/mapbuf_example.c
Examining data/efl-1.25.1/src/examples/elementary/menu_cxx_example_01.cc
Examining data/efl-1.25.1/src/examples/elementary/menu_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/naviframe_example.c
Examining data/efl-1.25.1/src/examples/elementary/notify_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/panel_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/panes_example.c
Examining data/efl-1.25.1/src/examples/elementary/photocam_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/popup_cxx_example.cc
Examining data/efl-1.25.1/src/examples/elementary/popup_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/popup_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/popup_example_03.c
Examining data/efl-1.25.1/src/examples/elementary/prefs_data_example.c
Examining data/efl-1.25.1/src/examples/elementary/prefs_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/prefs_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/prefs_example_03.c
Examining data/efl-1.25.1/src/examples/elementary/progressbar_example.c
Examining data/efl-1.25.1/src/examples/elementary/radio_cxx_example_01.cc
Examining data/efl-1.25.1/src/examples/elementary/radio_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/radio_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/scroller_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/scroller_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/segment_control_example.c
Examining data/efl-1.25.1/src/examples/elementary/separator_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/slider_cxx_example.cc
Examining data/efl-1.25.1/src/examples/elementary/slider_example.c
Examining data/efl-1.25.1/src/examples/elementary/slideshow_example.c
Examining data/efl-1.25.1/src/examples/elementary/spinner_cxx_example.cc
Examining data/efl-1.25.1/src/examples/elementary/spinner_example.c
Examining data/efl-1.25.1/src/examples/elementary/table_cxx_example_01.cc
Examining data/efl-1.25.1/src/examples/elementary/table_cxx_example_02.cc
Examining data/efl-1.25.1/src/examples/elementary/table_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/table_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/theme_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/theme_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/thumb_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/toolbar_cxx_example_01.cc
Examining data/efl-1.25.1/src/examples/elementary/toolbar_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/toolbar_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/toolbar_example_03.c
Examining data/efl-1.25.1/src/examples/elementary/track_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/transit_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/transit_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/transit_example_03.c
Examining data/efl-1.25.1/src/examples/elementary/transit_example_04.c
Examining data/efl-1.25.1/src/examples/elementary/web_example_01.c
Examining data/efl-1.25.1/src/examples/elementary/web_example_02.c
Examining data/efl-1.25.1/src/examples/elementary/win_example.c
Examining data/efl-1.25.1/src/examples/emile/emile_base64.c
Examining data/efl-1.25.1/src/examples/emotion/emotion_basic_example.c
Examining data/efl-1.25.1/src/examples/emotion/emotion_border_example.c
Examining data/efl-1.25.1/src/examples/emotion/emotion_generic_example.c
Examining data/efl-1.25.1/src/examples/emotion/emotion_generic_subtitle_example.c
Examining data/efl-1.25.1/src/examples/emotion/emotion_signals_example.c
Examining data/efl-1.25.1/src/examples/eolian_cxx/colourable.c
Examining data/efl-1.25.1/src/examples/eolian_cxx/colourable_cxx.cc
Examining data/efl-1.25.1/src/examples/eolian_cxx/colourable_stub.c
Examining data/efl-1.25.1/src/examples/eolian_cxx/colourable_stub.h
Examining data/efl-1.25.1/src/examples/eolian_cxx/colourablesquare.c
Examining data/efl-1.25.1/src/examples/eolian_cxx/colourablesquare_cxx.cc
Examining data/efl-1.25.1/src/examples/eolian_cxx/colourablesquare_stub.c
Examining data/efl-1.25.1/src/examples/eolian_cxx/colourablesquare_stub.h
Examining data/efl-1.25.1/src/examples/eolian_cxx/eolian_cxx_callbacks_01.cc
Examining data/efl-1.25.1/src/examples/eolian_cxx/eolian_cxx_simple_01.cc
Examining data/efl-1.25.1/src/examples/eolian_cxx/eolian_cxx_simple_01_cxx_impl.cc
Examining data/efl-1.25.1/src/examples/ephysics/ephysics_logo.c
Examining data/efl-1.25.1/src/examples/ephysics/ephysics_test.h
Examining data/efl-1.25.1/src/examples/ephysics/test.c
Examining data/efl-1.25.1/src/examples/ephysics/test_bouncing_ball.c
Examining data/efl-1.25.1/src/examples/ephysics/test_bouncing_text.c
Examining data/efl-1.25.1/src/examples/ephysics/test_camera.c
Examining data/efl-1.25.1/src/examples/ephysics/test_camera_track.c
Examining data/efl-1.25.1/src/examples/ephysics/test_colliding_balls.c
Examining data/efl-1.25.1/src/examples/ephysics/test_collision_detection.c
Examining data/efl-1.25.1/src/examples/ephysics/test_collision_filter.c
Examining data/efl-1.25.1/src/examples/ephysics/test_constraint.c
Examining data/efl-1.25.1/src/examples/ephysics/test_delete.c
Examining data/efl-1.25.1/src/examples/ephysics/test_forces.c
Examining data/efl-1.25.1/src/examples/ephysics/test_growing_balls.c
Examining data/efl-1.25.1/src/examples/ephysics/test_no_gravity.c
Examining data/efl-1.25.1/src/examples/ephysics/test_rotating_forever.c
Examining data/efl-1.25.1/src/examples/ephysics/test_shapes.c
Examining data/efl-1.25.1/src/examples/ephysics/test_sleeping_threshold.c
Examining data/efl-1.25.1/src/examples/ephysics/test_slider.c
Examining data/efl-1.25.1/src/examples/ephysics/test_velocity.c
Examining data/efl-1.25.1/src/examples/ethumb_client/ethumb_dbus.c
Examining data/efl-1.25.1/src/examples/evas/efl-canvas-animation.c
Examining data/efl-1.25.1/src/examples/evas/efl-canvas-vg-simple.c
Examining data/efl-1.25.1/src/examples/evas/evas-aspect-hints.c
Examining data/efl-1.25.1/src/examples/evas/evas-box.c
Examining data/efl-1.25.1/src/examples/evas/evas-buffer-simple.c
Examining data/efl-1.25.1/src/examples/evas/evas-common.h
Examining data/efl-1.25.1/src/examples/evas/evas-event-filter.c
Examining data/efl-1.25.1/src/examples/evas/evas-events.c
Examining data/efl-1.25.1/src/examples/evas/evas-gl.c
Examining data/efl-1.25.1/src/examples/evas/evas-hints.c
Examining data/efl-1.25.1/src/examples/evas/evas-images.c
Examining data/efl-1.25.1/src/examples/evas/evas-images2.c
Examining data/efl-1.25.1/src/examples/evas/evas-images3.c
Examining data/efl-1.25.1/src/examples/evas/evas-images4.c
Examining data/efl-1.25.1/src/examples/evas/evas-images5.c
Examining data/efl-1.25.1/src/examples/evas/evas-images6.c
Examining data/efl-1.25.1/src/examples/evas/evas-init-shutdown.c
Examining data/efl-1.25.1/src/examples/evas/evas-map-aa-eo.c
Examining data/efl-1.25.1/src/examples/evas/evas-map-aa.c
Examining data/efl-1.25.1/src/examples/evas/evas-map-utils-eo.c
Examining data/efl-1.25.1/src/examples/evas/evas-map-utils.c
Examining data/efl-1.25.1/src/examples/evas/evas-multi-touch.c
Examining data/efl-1.25.1/src/examples/evas/evas-multiseat-events.c
Examining data/efl-1.25.1/src/examples/evas/evas-object-manipulation-eo.c
Examining data/efl-1.25.1/src/examples/evas/evas-object-manipulation.c
Examining data/efl-1.25.1/src/examples/evas/evas-smart-interface.c
Examining data/efl-1.25.1/src/examples/evas/evas-smart-object.c
Examining data/efl-1.25.1/src/examples/evas/evas-stacking.c
Examining data/efl-1.25.1/src/examples/evas/evas-table.c
Examining data/efl-1.25.1/src/examples/evas/evas-text.c
Examining data/efl-1.25.1/src/examples/evas/evas-textblock-obstacles.c
Examining data/efl-1.25.1/src/examples/evas/evas-transparent.c
Examining data/efl-1.25.1/src/examples/evas/evas-vg-batman.c
Examining data/efl-1.25.1/src/examples/evas/evas-vg-json.c
Examining data/efl-1.25.1/src/examples/evas/evas-vg-simple.c
Examining data/efl-1.25.1/src/examples/evas/evas_cxx_rectangle.cc
Examining data/efl-1.25.1/src/generic/evas/common/shmfile.c
Examining data/efl-1.25.1/src/generic/evas/common/shmfile.h
Examining data/efl-1.25.1/src/generic/evas/common/timeout.c
Examining data/efl-1.25.1/src/generic/evas/common/timeout.h
Examining data/efl-1.25.1/src/generic/evas/gst/main.c
Examining data/efl-1.25.1/src/generic/evas/pdf/main.cpp
Examining data/efl-1.25.1/src/generic/evas/ps/main.c
Examining data/efl-1.25.1/src/generic/evas/raw/main.c
Examining data/efl-1.25.1/src/generic/evas/rsvg/main.c
Examining data/efl-1.25.1/src/generic/evas/xcf/common.h
Examining data/efl-1.25.1/src/generic/evas/xcf/main.c
Examining data/efl-1.25.1/src/generic/evas/xcf/pixelfuncs.c
Examining data/efl-1.25.1/src/lib/ecore/Ecore.h
Examining data/efl-1.25.1/src/lib/ecore/Ecore_Common.h
Examining data/efl-1.25.1/src/lib/ecore/Ecore_Eo.h
Examining data/efl-1.25.1/src/lib/ecore/Ecore_Getopt.h
Examining data/efl-1.25.1/src/lib/ecore/Ecore_Legacy.h
Examining data/efl-1.25.1/src/lib/ecore/Efl_Core.h
Examining data/efl-1.25.1/src/lib/ecore/ecore.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_alloc.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_anim.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_app.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_event_message.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_event_message_handler.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_events.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_exe.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_exe_eo.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_exe_eo.h
Examining data/efl-1.25.1/src/lib/ecore/ecore_exe_eo.legacy.h
Examining data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_exe_private.h
Examining data/efl-1.25.1/src/lib/ecore/ecore_exe_win32.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_getopt.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_glib.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_idle_enterer.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_idle_exiter.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_idler.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_internal.h
Examining data/efl-1.25.1/src/lib/ecore/ecore_job.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_main.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_main_common.h
Examining data/efl-1.25.1/src/lib/ecore/ecore_main_timechanges.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_pipe.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_poller.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_private.h
Examining data/efl-1.25.1/src/lib/ecore/ecore_signal.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_thread.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_throttle.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_time.c
Examining data/efl-1.25.1/src/lib/ecore/ecore_timer.c
Examining data/efl-1.25.1/src/lib/ecore/efl_accelerate_interpolator.c
Examining data/efl-1.25.1/src/lib/ecore/efl_app.c
Examining data/efl-1.25.1/src/lib/ecore/efl_appthread.c
Examining data/efl-1.25.1/src/lib/ecore/efl_boolean_model.c
Examining data/efl-1.25.1/src/lib/ecore/efl_bounce_interpolator.c
Examining data/efl-1.25.1/src/lib/ecore/efl_composite_model.c
Examining data/efl-1.25.1/src/lib/ecore/efl_container_model.c
Examining data/efl-1.25.1/src/lib/ecore/efl_core_command_line.c
Examining data/efl-1.25.1/src/lib/ecore/efl_core_env.c
Examining data/efl-1.25.1/src/lib/ecore/efl_core_proc_env.c
Examining data/efl-1.25.1/src/lib/ecore/efl_cubic_bezier_interpolator.c
Examining data/efl-1.25.1/src/lib/ecore/efl_decelerate_interpolator.c
Examining data/efl-1.25.1/src/lib/ecore/efl_divisor_interpolator.c
Examining data/efl-1.25.1/src/lib/ecore/efl_exe.c
Examining data/efl-1.25.1/src/lib/ecore/efl_filter_model.c
Examining data/efl-1.25.1/src/lib/ecore/efl_general.h
Examining data/efl-1.25.1/src/lib/ecore/efl_generic_model.c
Examining data/efl-1.25.1/src/lib/ecore/efl_io_buffered_stream.c
Examining data/efl-1.25.1/src/lib/ecore/efl_io_closer_fd.c
Examining data/efl-1.25.1/src/lib/ecore/efl_io_copier.c
Examining data/efl-1.25.1/src/lib/ecore/efl_io_file.c
Examining data/efl-1.25.1/src/lib/ecore/efl_io_positioner_fd.c
Examining data/efl-1.25.1/src/lib/ecore/efl_io_reader_fd.c
Examining data/efl-1.25.1/src/lib/ecore/efl_io_sizer_fd.c
Examining data/efl-1.25.1/src/lib/ecore/efl_io_stderr.c
Examining data/efl-1.25.1/src/lib/ecore/efl_io_stdin.c
Examining data/efl-1.25.1/src/lib/ecore/efl_io_stdout.c
Examining data/efl-1.25.1/src/lib/ecore/efl_io_writer_fd.c
Examining data/efl-1.25.1/src/lib/ecore/efl_linear_interpolator.c
Examining data/efl-1.25.1/src/lib/ecore/efl_loop.c
Examining data/efl-1.25.1/src/lib/ecore/efl_loop_consumer.c
Examining data/efl-1.25.1/src/lib/ecore/efl_loop_fd.c
Examining data/efl-1.25.1/src/lib/ecore/efl_loop_handler.c
Examining data/efl-1.25.1/src/lib/ecore/efl_loop_message.c
Examining data/efl-1.25.1/src/lib/ecore/efl_loop_message_future.c
Examining data/efl-1.25.1/src/lib/ecore/efl_loop_message_future_handler.c
Examining data/efl-1.25.1/src/lib/ecore/efl_loop_message_handler.c
Examining data/efl-1.25.1/src/lib/ecore/efl_loop_model.c
Examining data/efl-1.25.1/src/lib/ecore/efl_loop_timer_eo.legacy.c
Examining data/efl-1.25.1/src/lib/ecore/efl_loop_timer_eo.legacy.h
Examining data/efl-1.25.1/src/lib/ecore/efl_sinusoidal_interpolator.c
Examining data/efl-1.25.1/src/lib/ecore/efl_spring_interpolator.c
Examining data/efl-1.25.1/src/lib/ecore/efl_task.c
Examining data/efl-1.25.1/src/lib/ecore/efl_thread.c
Examining data/efl-1.25.1/src/lib/ecore/efl_threadio.c
Examining data/efl-1.25.1/src/lib/ecore_audio/Ecore_Audio.h
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_alsa.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_custom.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj.h
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_in.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_in.h
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_in_sndfile.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_in_sndfile.h
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_in_tone.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_in_tone.h
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out.h
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out_pulse.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out_pulse.h
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out_sndfile.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out_sndfile.h
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out_wasapi.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out_wasapi.h
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_private.h
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_protected.h
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_pulse.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_pulse_ml.c
Examining data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_sndfile_vio.c
Examining data/efl-1.25.1/src/lib/ecore_avahi/Ecore_Avahi.h
Examining data/efl-1.25.1/src/lib/ecore_avahi/ecore_avahi.c
Examining data/efl-1.25.1/src/lib/ecore_buffer/Ecore_Buffer.h
Examining data/efl-1.25.1/src/lib/ecore_buffer/Ecore_Buffer_Queue.h
Examining data/efl-1.25.1/src/lib/ecore_buffer/bq_mgr_protocol.c
Examining data/efl-1.25.1/src/lib/ecore_buffer/bq_mgr_protocol.h
Examining data/efl-1.25.1/src/lib/ecore_buffer/buffer_queue.c
Examining data/efl-1.25.1/src/lib/ecore_buffer/buffer_queue.h
Examining data/efl-1.25.1/src/lib/ecore_buffer/ecore_buffer.c
Examining data/efl-1.25.1/src/lib/ecore_buffer/ecore_buffer_con.c
Examining data/efl-1.25.1/src/lib/ecore_buffer/ecore_buffer_con.h
Examining data/efl-1.25.1/src/lib/ecore_buffer/ecore_buffer_consumer.c
Examining data/efl-1.25.1/src/lib/ecore_buffer/ecore_buffer_private.h
Examining data/efl-1.25.1/src/lib/ecore_buffer/ecore_buffer_provider.c
Examining data/efl-1.25.1/src/lib/ecore_buffer/ecore_buffer_queue_main.c
Examining data/efl-1.25.1/src/lib/ecore_buffer/shared_buffer.c
Examining data/efl-1.25.1/src/lib/ecore_buffer/shared_buffer.h
Examining data/efl-1.25.1/src/lib/ecore_cocoa/Ecore_Cocoa.h
Examining data/efl-1.25.1/src/lib/ecore_cocoa/ecore_cocoa_app.h
Examining data/efl-1.25.1/src/lib/ecore_cocoa/ecore_cocoa_keys.h
Examining data/efl-1.25.1/src/lib/ecore_cocoa/ecore_cocoa_private.h
Examining data/efl-1.25.1/src/lib/ecore_cocoa/ecore_cocoa_window.h
Examining data/efl-1.25.1/src/lib/ecore_con/Ecore_Con.h
Examining data/efl-1.25.1/src/lib/ecore_con/Ecore_Con_Eet.h
Examining data/efl-1.25.1/src/lib/ecore_con/Ecore_Con_Eet_Eo.h
Examining data/efl-1.25.1/src/lib/ecore_con/Ecore_Con_Eet_Legacy.h
Examining data/efl-1.25.1/src/lib/ecore_con/Efl_Net.h
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_alloc.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet_base_eo.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet_base_eo.h
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet_base_eo.legacy.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet_base_eo.legacy.h
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet_client_obj_eo.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet_client_obj_eo.h
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet_client_obj_eo.legacy.h
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet_server_obj_eo.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet_server_obj_eo.h
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet_server_obj_eo.legacy.h
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_legacy.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_local.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_local_win32.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_private.h
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_proxy_helper.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_url_curl.h
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net-connman.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net-connman.h
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_control-connman.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_control-none.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_control_access_point-connman.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_control_access_point-none.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_control_technology-connman.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_control_technology-none.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_simple.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_ssl.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_tcp.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_udp.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_unix.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_windows.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_ip_address.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_server.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_server_fd.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_server_ip.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_server_simple.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_server_ssl.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_server_tcp.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_server_udp.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_server_udp_client.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_server_windows.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_session-connman.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_session-none.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_socket.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_fd.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_simple.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_ssl.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_tcp.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_udp.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_unix.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_windows.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_conn-gnutls.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_conn-none.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_conn-openssl.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_context.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_ctx-gnutls.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_ctx-none.c
Examining data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_ctx-openssl.c
Examining data/efl-1.25.1/src/lib/ecore_con/ecore_con_url_curl.c
Examining data/efl-1.25.1/src/lib/ecore_drm/Ecore_Drm.h
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm.c
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_dbus.c
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_device.c
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_fb.c
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_inputs.c
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_launcher.c
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_logind.c
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_output.c
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_private.h
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_sprites.c
Examining data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_tty.c
Examining data/efl-1.25.1/src/lib/ecore_drm2/Ecore_Drm2.h
Examining data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2.c
Examining data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_device.c
Examining data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_fb.c
Examining data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_outputs.c
Examining data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_plane.c
Examining data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_private.h
Examining data/efl-1.25.1/src/lib/ecore_evas/Ecore_Evas.h
Examining data/efl-1.25.1/src/lib/ecore_evas/Ecore_Evas_Types.h
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_buffer.c
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_buffer.h
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_cocoa.h
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_deprecated.c
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_drm.h
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_ews.c
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_extn.c
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_extn.h
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_fallback_selection.c
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_module.c
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_private.h
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_util.c
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_wayland.h
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_win32.h
Examining data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_x11.h
Examining data/efl-1.25.1/src/lib/ecore_fb/Ecore_Fb.h
Examining data/efl-1.25.1/src/lib/ecore_fb/ecore_fb.c
Examining data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_keytable.h
Examining data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c
Examining data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_private.h
Examining data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_ts.c
Examining data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_vt.c
Examining data/efl-1.25.1/src/lib/ecore_file/Ecore_File.h
Examining data/efl-1.25.1/src/lib/ecore_file/ecore_file.c
Examining data/efl-1.25.1/src/lib/ecore_file/ecore_file_download.c
Examining data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor.c
Examining data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_inotify.c
Examining data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_poll.c
Examining data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_win32.c
Examining data/efl-1.25.1/src/lib/ecore_file/ecore_file_path.c
Examining data/efl-1.25.1/src/lib/ecore_file/ecore_file_private.h
Examining data/efl-1.25.1/src/lib/ecore_imf/Ecore_IMF.h
Examining data/efl-1.25.1/src/lib/ecore_imf/ecore_imf.c
Examining data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_context.c
Examining data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c
Examining data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_private.h
Examining data/efl-1.25.1/src/lib/ecore_imf_evas/Ecore_IMF_Evas.h
Examining data/efl-1.25.1/src/lib/ecore_imf_evas/ecore_imf_evas.c
Examining data/efl-1.25.1/src/lib/ecore_input/Ecore_Input.h
Examining data/efl-1.25.1/src/lib/ecore_input/ecore_input.c
Examining data/efl-1.25.1/src/lib/ecore_input/ecore_input_compose.c
Examining data/efl-1.25.1/src/lib/ecore_input/ecore_input_compose.h
Examining data/efl-1.25.1/src/lib/ecore_input/ecore_input_joystick.c
Examining data/efl-1.25.1/src/lib/ecore_input/ecore_input_private.h
Examining data/efl-1.25.1/src/lib/ecore_input_evas/Ecore_Input_Evas.h
Examining data/efl-1.25.1/src/lib/ecore_input_evas/ecore_input_evas.c
Examining data/efl-1.25.1/src/lib/ecore_input_evas/ecore_input_evas_private.h
Examining data/efl-1.25.1/src/lib/ecore_ipc/Ecore_Ipc.h
Examining data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c
Examining data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc_private.h
Examining data/efl-1.25.1/src/lib/ecore_sdl/Ecore_Sdl.h
Examining data/efl-1.25.1/src/lib/ecore_sdl/Ecore_Sdl_Keys.h
Examining data/efl-1.25.1/src/lib/ecore_sdl/ecore_sdl.c
Examining data/efl-1.25.1/src/lib/ecore_sdl/ecore_sdl_private.h
Examining data/efl-1.25.1/src/lib/ecore_wayland/Ecore_Wayland.h
Examining data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl.c
Examining data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_dnd.c
Examining data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c
Examining data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_output.c
Examining data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_private.h
Examining data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_subsurf.c
Examining data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_window.c
Examining data/efl-1.25.1/src/lib/ecore_wayland/ivi-application-client-protocol.h
Examining data/efl-1.25.1/src/lib/ecore_wayland/ivi-application-protocol.c
Examining data/efl-1.25.1/src/lib/ecore_wayland/session-recovery-client-protocol.h
Examining data/efl-1.25.1/src/lib/ecore_wayland/session-recovery-protocol.c
Examining data/efl-1.25.1/src/lib/ecore_wayland/subsurface-client-protocol.h
Examining data/efl-1.25.1/src/lib/ecore_wayland/subsurface-protocol.c
Examining data/efl-1.25.1/src/lib/ecore_wayland/xdg-shell-client-protocol.h
Examining data/efl-1.25.1/src/lib/ecore_wayland/xdg-shell-protocol.c
Examining data/efl-1.25.1/src/lib/ecore_win32/Ecore_Win32.h
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32.c
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_clipboard.c
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_cursor.c
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_cursor_x11.h
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd.c
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd_data_object.cpp
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd_data_object.h
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd_drop_source.cpp
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd_drop_source.h
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd_drop_target.cpp
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd_drop_target.h
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd_enumformatetc.cpp
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd_enumformatetc.h
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_keysym_table.h
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_monitor.c
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_private.h
Examining data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_window.c
Examining data/efl-1.25.1/src/lib/ecore_wl2/Ecore_Wl2.h
Examining data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2.c
Examining data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_buffer.c
Examining data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_display.c
Examining data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_dnd.c
Examining data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c
Examining data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_internal.h
Examining data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_output.c
Examining data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_private.h
Examining data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_subsurf.c
Examining data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_surface.c
Examining data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_window.c
Examining data/efl-1.25.1/src/lib/ecore_x/Ecore_X.h
Examining data/efl-1.25.1/src/lib/ecore_x/Ecore_X_Atoms.h
Examining data/efl-1.25.1/src/lib/ecore_x/Ecore_X_Cursor.h
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_atoms.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_atoms_decl.h
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_composite.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_cursor.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_damage.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_dnd.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_dpms.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_drawable.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_e.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_error.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_events.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_fixes.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_gc.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_gesture.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_icccm.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_image.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_keygrab.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_mwm.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_pixmap.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_present.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_private.h
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_region.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_screensaver.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_selection.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_sync.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_test.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_window.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_window_prop.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_window_shape.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_xi2.c
Examining data/efl-1.25.1/src/lib/ecore_x/ecore_x_xinerama.c
Examining data/efl-1.25.1/src/lib/ector/Ector.h
Examining data/efl-1.25.1/src/lib/ector/ector_buffer.c
Examining data/efl-1.25.1/src/lib/ector/ector_buffer.h
Examining data/efl-1.25.1/src/lib/ector/ector_gl_internal.h
Examining data/efl-1.25.1/src/lib/ector/ector_main.c
Examining data/efl-1.25.1/src/lib/ector/ector_private.h
Examining data/efl-1.25.1/src/lib/ector/ector_renderer.c
Examining data/efl-1.25.1/src/lib/ector/ector_renderer.h
Examining data/efl-1.25.1/src/lib/ector/ector_renderer_gradient.c
Examining data/efl-1.25.1/src/lib/ector/ector_renderer_gradient_linear.c
Examining data/efl-1.25.1/src/lib/ector/ector_renderer_gradient_radial.c
Examining data/efl-1.25.1/src/lib/ector/ector_renderer_image.c
Examining data/efl-1.25.1/src/lib/ector/ector_renderer_shape.c
Examining data/efl-1.25.1/src/lib/ector/ector_surface.h
Examining data/efl-1.25.1/src/lib/ector/ector_util.h
Examining data/efl-1.25.1/src/lib/ector/gl/Ector_GL.h
Examining data/efl-1.25.1/src/lib/ector/gl/ector_gl_buffer.c
Examining data/efl-1.25.1/src/lib/ector/gl/ector_gl_private.h
Examining data/efl-1.25.1/src/lib/ector/gl/ector_gl_shader.c
Examining data/efl-1.25.1/src/lib/ector/gl/ector_gl_surface.c
Examining data/efl-1.25.1/src/lib/ector/gl/ector_renderer_gl.c
Examining data/efl-1.25.1/src/lib/ector/gl/ector_renderer_gl_gradient_linear.c
Examining data/efl-1.25.1/src/lib/ector/gl/ector_renderer_gl_gradient_radial.c
Examining data/efl-1.25.1/src/lib/ector/gl/ector_renderer_gl_shape.c
Examining data/efl-1.25.1/src/lib/ector/software/Ector_Software.h
Examining data/efl-1.25.1/src/lib/ector/software/ector_renderer_software_gradient_linear.c
Examining data/efl-1.25.1/src/lib/ector/software/ector_renderer_software_gradient_radial.c
Examining data/efl-1.25.1/src/lib/ector/software/ector_renderer_software_image.c
Examining data/efl-1.25.1/src/lib/ector/software/ector_renderer_software_shape.c
Examining data/efl-1.25.1/src/lib/ector/software/ector_software_buffer.c
Examining data/efl-1.25.1/src/lib/ector/software/ector_software_gradient.c
Examining data/efl-1.25.1/src/lib/ector/software/ector_software_gradient.h
Examining data/efl-1.25.1/src/lib/ector/software/ector_software_gradient_sse3.c
Examining data/efl-1.25.1/src/lib/ector/software/ector_software_private.h
Examining data/efl-1.25.1/src/lib/ector/software/ector_software_rasterizer.c
Examining data/efl-1.25.1/src/lib/ector/software/ector_software_surface.c
Examining data/efl-1.25.1/src/lib/edje/Edje.h
Examining data/efl-1.25.1/src/lib/edje/Edje_Common.h
Examining data/efl-1.25.1/src/lib/edje/Edje_Edit.h
Examining data/efl-1.25.1/src/lib/edje/Edje_Eo.h
Examining data/efl-1.25.1/src/lib/edje/Edje_Legacy.h
Examining data/efl-1.25.1/src/lib/edje/Efl_Layout.h
Examining data/efl-1.25.1/src/lib/edje/edje_box_layout.c
Examining data/efl-1.25.1/src/lib/edje/edje_cache.c
Examining data/efl-1.25.1/src/lib/edje/edje_calc.c
Examining data/efl-1.25.1/src/lib/edje/edje_callbacks.c
Examining data/efl-1.25.1/src/lib/edje/edje_convert.c
Examining data/efl-1.25.1/src/lib/edje/edje_convert.h
Examining data/efl-1.25.1/src/lib/edje/edje_data.c
Examining data/efl-1.25.1/src/lib/edje/edje_edit.c
Examining data/efl-1.25.1/src/lib/edje/edje_edit_eo.c
Examining data/efl-1.25.1/src/lib/edje/edje_edit_eo.h
Examining data/efl-1.25.1/src/lib/edje/edje_edit_eo.legacy.h
Examining data/efl-1.25.1/src/lib/edje/edje_embryo.c
Examining data/efl-1.25.1/src/lib/edje/edje_entry.c
Examining data/efl-1.25.1/src/lib/edje/edje_external.c
Examining data/efl-1.25.1/src/lib/edje/edje_legacy.c
Examining data/efl-1.25.1/src/lib/edje/edje_load.c
Examining data/efl-1.25.1/src/lib/edje/edje_lua.c
Examining data/efl-1.25.1/src/lib/edje/edje_lua2.c
Examining data/efl-1.25.1/src/lib/edje/edje_lua_script_only.c
Examining data/efl-1.25.1/src/lib/edje/edje_main.c
Examining data/efl-1.25.1/src/lib/edje/edje_match.c
Examining data/efl-1.25.1/src/lib/edje/edje_message_queue.c
Examining data/efl-1.25.1/src/lib/edje/edje_misc.c
Examining data/efl-1.25.1/src/lib/edje/edje_module.c
Examining data/efl-1.25.1/src/lib/edje/edje_multisense.c
Examining data/efl-1.25.1/src/lib/edje/edje_part.c
Examining data/efl-1.25.1/src/lib/edje/edje_part_box.c
Examining data/efl-1.25.1/src/lib/edje/edje_part_external.c
Examining data/efl-1.25.1/src/lib/edje/edje_part_helper.h
Examining data/efl-1.25.1/src/lib/edje/edje_part_invalid.c
Examining data/efl-1.25.1/src/lib/edje/edje_part_swallow.c
Examining data/efl-1.25.1/src/lib/edje/edje_part_table.c
Examining data/efl-1.25.1/src/lib/edje/edje_part_text.c
Examining data/efl-1.25.1/src/lib/edje/edje_private.h
Examining data/efl-1.25.1/src/lib/edje/edje_program.c
Examining data/efl-1.25.1/src/lib/edje/edje_signal.c
Examining data/efl-1.25.1/src/lib/edje/edje_smart.c
Examining data/efl-1.25.1/src/lib/edje/edje_text.c
Examining data/efl-1.25.1/src/lib/edje/edje_textblock.c
Examining data/efl-1.25.1/src/lib/edje/edje_textblock_styles.c
Examining data/efl-1.25.1/src/lib/edje/edje_util.c
Examining data/efl-1.25.1/src/lib/edje/edje_var.c
Examining data/efl-1.25.1/src/lib/edje/efl_canvas_layout_eo.legacy.c
Examining data/efl-1.25.1/src/lib/edje/efl_canvas_layout_eo.legacy.h
Examining data/efl-1.25.1/src/lib/edje/efl_layout_group_eo.legacy.c
Examining data/efl-1.25.1/src/lib/edje/efl_layout_group_eo.legacy.h
Examining data/efl-1.25.1/src/lib/eet/Eet.h
Examining data/efl-1.25.1/src/lib/eet/Eet_private.h
Examining data/efl-1.25.1/src/lib/eet/eet_alloc.c
Examining data/efl-1.25.1/src/lib/eet/eet_cipher.c
Examining data/efl-1.25.1/src/lib/eet/eet_connection.c
Examining data/efl-1.25.1/src/lib/eet/eet_data.c
Examining data/efl-1.25.1/src/lib/eet/eet_dictionary.c
Examining data/efl-1.25.1/src/lib/eet/eet_image.c
Examining data/efl-1.25.1/src/lib/eet/eet_lib.c
Examining data/efl-1.25.1/src/lib/eet/eet_node.c
Examining data/efl-1.25.1/src/lib/eet/eet_utils.c
Examining data/efl-1.25.1/src/lib/eeze/Eeze.h
Examining data/efl-1.25.1/src/lib/eeze/Eeze_Disk.h
Examining data/efl-1.25.1/src/lib/eeze/Eeze_Net.h
Examining data/efl-1.25.1/src/lib/eeze/Eeze_Sensor.h
Examining data/efl-1.25.1/src/lib/eeze/eeze_disk.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_disk_dummy.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_disk_libmount.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_disk_libmount_new.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_disk_libmount_old.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_disk_mount.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_disk_private.h
Examining data/efl-1.25.1/src/lib/eeze/eeze_disk_udev.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_main.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_net.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_net_private.h
Examining data/efl-1.25.1/src/lib/eeze/eeze_sensor.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_sensor_private.h
Examining data/efl-1.25.1/src/lib/eeze/eeze_udev_find.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_udev_private.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_udev_private.h
Examining data/efl-1.25.1/src/lib/eeze/eeze_udev_syspath.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_udev_walk.c
Examining data/efl-1.25.1/src/lib/eeze/eeze_udev_watch.c
Examining data/efl-1.25.1/src/lib/efl/Efl.h
Examining data/efl-1.25.1/src/lib/efl/Efl_MVVM_Common.h
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_file.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_file.h
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_gfx_color.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_gfx_path.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_gfx_shape.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_interfaces_main.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_io_buffer.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_io_closer.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_io_positioner.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_io_queue.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_io_reader.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_io_sizer.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_io_writer.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_model_provider.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_mvvm_common.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_observer.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_text_markup_util.c
Examining data/efl-1.25.1/src/lib/efl/interfaces/efl_ui_layout_orientable_readonly.c
Examining data/efl-1.25.1/src/lib/efl_canvas_wl/Efl_Canvas_Wl.h
Examining data/efl-1.25.1/src/lib/efl_canvas_wl/dmabuf.c
Examining data/efl-1.25.1/src/lib/efl_canvas_wl/dmabuf.h
Examining data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c
Examining data/efl-1.25.1/src/lib/efl_mono/efl_custom_exports_mono.c
Examining data/efl-1.25.1/src/lib/efl_mono/efl_mono_accessors.c
Examining data/efl-1.25.1/src/lib/efl_mono/efl_mono_model_internal.c
Examining data/efl-1.25.1/src/lib/efreet/Efreet.h
Examining data/efl-1.25.1/src/lib/efreet/Efreet_Mime.h
Examining data/efl-1.25.1/src/lib/efreet/Efreet_Trash.h
Examining data/efl-1.25.1/src/lib/efreet/efreet.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_base.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_base.h
Examining data/efl-1.25.1/src/lib/efreet/efreet_cache.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_cache_private.h
Examining data/efl-1.25.1/src/lib/efreet/efreet_desktop.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_desktop.h
Examining data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_icon.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_icon.h
Examining data/efl-1.25.1/src/lib/efreet/efreet_ini.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_ini.h
Examining data/efl-1.25.1/src/lib/efreet/efreet_menu.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_menu.h
Examining data/efl-1.25.1/src/lib/efreet/efreet_mime.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_private.h
Examining data/efl-1.25.1/src/lib/efreet/efreet_trash.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_uri.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_uri.h
Examining data/efl-1.25.1/src/lib/efreet/efreet_utils.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_utils.h
Examining data/efl-1.25.1/src/lib/efreet/efreet_xml.c
Examining data/efl-1.25.1/src/lib/efreet/efreet_xml.h
Examining data/efl-1.25.1/src/lib/eina/Eina.h
Examining data/efl-1.25.1/src/lib/eina/eina_abi.c
Examining data/efl-1.25.1/src/lib/eina/eina_abstract_content.c
Examining data/efl-1.25.1/src/lib/eina/eina_abstract_content.h
Examining data/efl-1.25.1/src/lib/eina/eina_accessor.c
Examining data/efl-1.25.1/src/lib/eina/eina_accessor.h
Examining data/efl-1.25.1/src/lib/eina/eina_alloca.h
Examining data/efl-1.25.1/src/lib/eina/eina_array.c
Examining data/efl-1.25.1/src/lib/eina/eina_array.h
Examining data/efl-1.25.1/src/lib/eina/eina_benchmark.c
Examining data/efl-1.25.1/src/lib/eina/eina_benchmark.h
Examining data/efl-1.25.1/src/lib/eina/eina_bezier.c
Examining data/efl-1.25.1/src/lib/eina/eina_bezier.h
Examining data/efl-1.25.1/src/lib/eina/eina_binbuf.c
Examining data/efl-1.25.1/src/lib/eina/eina_binbuf.h
Examining data/efl-1.25.1/src/lib/eina/eina_binshare.c
Examining data/efl-1.25.1/src/lib/eina/eina_binshare.h
Examining data/efl-1.25.1/src/lib/eina/eina_clist.h
Examining data/efl-1.25.1/src/lib/eina/eina_convert.c
Examining data/efl-1.25.1/src/lib/eina/eina_convert.h
Examining data/efl-1.25.1/src/lib/eina/eina_counter.c
Examining data/efl-1.25.1/src/lib/eina/eina_counter.h
Examining data/efl-1.25.1/src/lib/eina/eina_cow.c
Examining data/efl-1.25.1/src/lib/eina/eina_cow.h
Examining data/efl-1.25.1/src/lib/eina/eina_cpu.c
Examining data/efl-1.25.1/src/lib/eina/eina_cpu.h
Examining data/efl-1.25.1/src/lib/eina/eina_crc.c
Examining data/efl-1.25.1/src/lib/eina/eina_crc.h
Examining data/efl-1.25.1/src/lib/eina/eina_debug.c
Examining data/efl-1.25.1/src/lib/eina/eina_debug.h
Examining data/efl-1.25.1/src/lib/eina/eina_debug_bt.c
Examining data/efl-1.25.1/src/lib/eina/eina_debug_bt_file.c
Examining data/efl-1.25.1/src/lib/eina/eina_debug_chunk.c
Examining data/efl-1.25.1/src/lib/eina/eina_debug_cpu.c
Examining data/efl-1.25.1/src/lib/eina/eina_debug_private.h
Examining data/efl-1.25.1/src/lib/eina/eina_debug_thread.c
Examining data/efl-1.25.1/src/lib/eina/eina_debug_timer.c
Examining data/efl-1.25.1/src/lib/eina/eina_error.c
Examining data/efl-1.25.1/src/lib/eina/eina_error.h
Examining data/efl-1.25.1/src/lib/eina/eina_evlog.c
Examining data/efl-1.25.1/src/lib/eina/eina_evlog.h
Examining data/efl-1.25.1/src/lib/eina/eina_file.c
Examining data/efl-1.25.1/src/lib/eina/eina_file.h
Examining data/efl-1.25.1/src/lib/eina/eina_file_common.c
Examining data/efl-1.25.1/src/lib/eina/eina_file_common.h
Examining data/efl-1.25.1/src/lib/eina/eina_file_win32.c
Examining data/efl-1.25.1/src/lib/eina/eina_fp.c
Examining data/efl-1.25.1/src/lib/eina/eina_fp.h
Examining data/efl-1.25.1/src/lib/eina/eina_freeq.c
Examining data/efl-1.25.1/src/lib/eina/eina_freeq.h
Examining data/efl-1.25.1/src/lib/eina/eina_hamster.c
Examining data/efl-1.25.1/src/lib/eina/eina_hamster.h
Examining data/efl-1.25.1/src/lib/eina/eina_hash.c
Examining data/efl-1.25.1/src/lib/eina/eina_hash.h
Examining data/efl-1.25.1/src/lib/eina/eina_inarray.c
Examining data/efl-1.25.1/src/lib/eina/eina_inarray.h
Examining data/efl-1.25.1/src/lib/eina/eina_inline_private.h
Examining data/efl-1.25.1/src/lib/eina/eina_inlist.c
Examining data/efl-1.25.1/src/lib/eina/eina_inlist.h
Examining data/efl-1.25.1/src/lib/eina/eina_internal.h
Examining data/efl-1.25.1/src/lib/eina/eina_iterator.c
Examining data/efl-1.25.1/src/lib/eina/eina_iterator.h
Examining data/efl-1.25.1/src/lib/eina/eina_lalloc.c
Examining data/efl-1.25.1/src/lib/eina/eina_lalloc.h
Examining data/efl-1.25.1/src/lib/eina/eina_list.c
Examining data/efl-1.25.1/src/lib/eina/eina_list.h
Examining data/efl-1.25.1/src/lib/eina/eina_lock.c
Examining data/efl-1.25.1/src/lib/eina/eina_lock.h
Examining data/efl-1.25.1/src/lib/eina/eina_log.c
Examining data/efl-1.25.1/src/lib/eina/eina_log.h
Examining data/efl-1.25.1/src/lib/eina/eina_magic.c
Examining data/efl-1.25.1/src/lib/eina/eina_magic.h
Examining data/efl-1.25.1/src/lib/eina/eina_main.c
Examining data/efl-1.25.1/src/lib/eina/eina_main.h
Examining data/efl-1.25.1/src/lib/eina/eina_matrix.c
Examining data/efl-1.25.1/src/lib/eina/eina_matrix.h
Examining data/efl-1.25.1/src/lib/eina/eina_matrixsparse.c
Examining data/efl-1.25.1/src/lib/eina/eina_matrixsparse.h
Examining data/efl-1.25.1/src/lib/eina/eina_mempool.c
Examining data/efl-1.25.1/src/lib/eina/eina_mempool.h
Examining data/efl-1.25.1/src/lib/eina/eina_mmap.c
Examining data/efl-1.25.1/src/lib/eina/eina_mmap.h
Examining data/efl-1.25.1/src/lib/eina/eina_module.c
Examining data/efl-1.25.1/src/lib/eina/eina_module.h
Examining data/efl-1.25.1/src/lib/eina/eina_prefix.c
Examining data/efl-1.25.1/src/lib/eina/eina_prefix.h
Examining data/efl-1.25.1/src/lib/eina/eina_private.h
Examining data/efl-1.25.1/src/lib/eina/eina_promise.c
Examining data/efl-1.25.1/src/lib/eina/eina_promise.h
Examining data/efl-1.25.1/src/lib/eina/eina_promise_private.h
Examining data/efl-1.25.1/src/lib/eina/eina_quad.c
Examining data/efl-1.25.1/src/lib/eina/eina_quad.h
Examining data/efl-1.25.1/src/lib/eina/eina_quadtree.c
Examining data/efl-1.25.1/src/lib/eina/eina_quadtree.h
Examining data/efl-1.25.1/src/lib/eina/eina_quaternion.c
Examining data/efl-1.25.1/src/lib/eina/eina_quaternion.h
Examining data/efl-1.25.1/src/lib/eina/eina_range.h
Examining data/efl-1.25.1/src/lib/eina/eina_rbtree.c
Examining data/efl-1.25.1/src/lib/eina/eina_rbtree.h
Examining data/efl-1.25.1/src/lib/eina/eina_rectangle.c
Examining data/efl-1.25.1/src/lib/eina/eina_rectangle.h
Examining data/efl-1.25.1/src/lib/eina/eina_refcount.h
Examining data/efl-1.25.1/src/lib/eina/eina_safepointer.c
Examining data/efl-1.25.1/src/lib/eina/eina_safepointer.h
Examining data/efl-1.25.1/src/lib/eina/eina_safety_checks.c
Examining data/efl-1.25.1/src/lib/eina/eina_safety_checks.h
Examining data/efl-1.25.1/src/lib/eina/eina_sched.c
Examining data/efl-1.25.1/src/lib/eina/eina_sched.h
Examining data/efl-1.25.1/src/lib/eina/eina_share_common.c
Examining data/efl-1.25.1/src/lib/eina/eina_share_common.h
Examining data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c
Examining data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.h
Examining data/efl-1.25.1/src/lib/eina/eina_slice.h
Examining data/efl-1.25.1/src/lib/eina/eina_slstr.c
Examining data/efl-1.25.1/src/lib/eina/eina_slstr.h
Examining data/efl-1.25.1/src/lib/eina/eina_str.c
Examining data/efl-1.25.1/src/lib/eina/eina_str.h
Examining data/efl-1.25.1/src/lib/eina/eina_strbuf.c
Examining data/efl-1.25.1/src/lib/eina/eina_strbuf.h
Examining data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c
Examining data/efl-1.25.1/src/lib/eina/eina_strbuf_common.h
Examining data/efl-1.25.1/src/lib/eina/eina_stringshare.c
Examining data/efl-1.25.1/src/lib/eina/eina_stringshare.h
Examining data/efl-1.25.1/src/lib/eina/eina_thread.c
Examining data/efl-1.25.1/src/lib/eina/eina_thread.h
Examining data/efl-1.25.1/src/lib/eina/eina_thread_queue.c
Examining data/efl-1.25.1/src/lib/eina/eina_thread_queue.h
Examining data/efl-1.25.1/src/lib/eina/eina_tiler.c
Examining data/efl-1.25.1/src/lib/eina/eina_tiler.h
Examining data/efl-1.25.1/src/lib/eina/eina_tmpstr.c
Examining data/efl-1.25.1/src/lib/eina/eina_tmpstr.h
Examining data/efl-1.25.1/src/lib/eina/eina_trash.h
Examining data/efl-1.25.1/src/lib/eina/eina_types.h
Examining data/efl-1.25.1/src/lib/eina/eina_unicode.c
Examining data/efl-1.25.1/src/lib/eina/eina_unicode.h
Examining data/efl-1.25.1/src/lib/eina/eina_ustrbuf.c
Examining data/efl-1.25.1/src/lib/eina/eina_ustrbuf.h
Examining data/efl-1.25.1/src/lib/eina/eina_ustringshare.c
Examining data/efl-1.25.1/src/lib/eina/eina_ustringshare.h
Examining data/efl-1.25.1/src/lib/eina/eina_util.c
Examining data/efl-1.25.1/src/lib/eina/eina_util.h
Examining data/efl-1.25.1/src/lib/eina/eina_value.c
Examining data/efl-1.25.1/src/lib/eina/eina_value.h
Examining data/efl-1.25.1/src/lib/eina/eina_value_util.c
Examining data/efl-1.25.1/src/lib/eina/eina_value_util.h
Examining data/efl-1.25.1/src/lib/eina/eina_vector.h
Examining data/efl-1.25.1/src/lib/eina/eina_vpath.c
Examining data/efl-1.25.1/src/lib/eina/eina_vpath.h
Examining data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c
Examining data/efl-1.25.1/src/lib/eina/eina_xattr.c
Examining data/efl-1.25.1/src/lib/eina/eina_xattr.h
Examining data/efl-1.25.1/src/lib/eio/Eio.h
Examining data/efl-1.25.1/src/lib/eio/Eio_Eo.h
Examining data/efl-1.25.1/src/lib/eio/Eio_Legacy.h
Examining data/efl-1.25.1/src/lib/eio/efl_io_manager.c
Examining data/efl-1.25.1/src/lib/eio/efl_io_model.c
Examining data/efl-1.25.1/src/lib/eio/efl_io_model_private.h
Examining data/efl-1.25.1/src/lib/eio/eio_dir.c
Examining data/efl-1.25.1/src/lib/eio/eio_eet.c
Examining data/efl-1.25.1/src/lib/eio/eio_file.c
Examining data/efl-1.25.1/src/lib/eio/eio_main.c
Examining data/efl-1.25.1/src/lib/eio/eio_map.c
Examining data/efl-1.25.1/src/lib/eio/eio_monitor.c
Examining data/efl-1.25.1/src/lib/eio/eio_monitor_cocoa.c
Examining data/efl-1.25.1/src/lib/eio/eio_monitor_inotify.c
Examining data/efl-1.25.1/src/lib/eio/eio_monitor_kevent.c
Examining data/efl-1.25.1/src/lib/eio/eio_monitor_poll.c
Examining data/efl-1.25.1/src/lib/eio/eio_monitor_win32.c
Examining data/efl-1.25.1/src/lib/eio/eio_private.h
Examining data/efl-1.25.1/src/lib/eio/eio_sentry.c
Examining data/efl-1.25.1/src/lib/eio/eio_sentry_private.h
Examining data/efl-1.25.1/src/lib/eio/eio_single.c
Examining data/efl-1.25.1/src/lib/eio/eio_xattr.c
Examining data/efl-1.25.1/src/lib/eldbus/Eldbus.h
Examining data/efl-1.25.1/src/lib/eldbus/Eldbus_Model.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_connection.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_core.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_freedesktop.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_freedesktop.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_introspection.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_introspection.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_message.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_message.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_message_eina_value.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_message_from_eina_value.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_message_helper.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_message_helper.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_message_to_eina_value.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_arguments.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_arguments_private.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_connection.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_connection_private.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_method.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_method_private.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_object.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_object_private.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_private.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_proxy.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_proxy_private.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_signal.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_model_signal_private.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_object.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_object.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_pending.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_pending.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_private.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_private_types.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_proxy.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_proxy.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_service.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_service.h
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c
Examining data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.h
Examining data/efl-1.25.1/src/lib/elementary/Efl_Ui.h
Examining data/efl-1.25.1/src/lib/elementary/Elementary.h
Examining data/efl-1.25.1/src/lib/elementary/Elementary_Cursor.h
Examining data/efl-1.25.1/src/lib/elementary/efl_access_action.c
Examining data/efl-1.25.1/src/lib/elementary/efl_access_component.c
Examining data/efl-1.25.1/src/lib/elementary/efl_access_editable_text.c
Examining data/efl-1.25.1/src/lib/elementary/efl_access_object.c
Examining data/efl-1.25.1/src/lib/elementary/efl_access_object.h
Examining data/efl-1.25.1/src/lib/elementary/efl_access_selection.c
Examining data/efl-1.25.1/src/lib/elementary/efl_access_text.c
Examining data/efl-1.25.1/src/lib/elementary/efl_access_text.h
Examining data/efl-1.25.1/src/lib/elementary/efl_access_value.c
Examining data/efl-1.25.1/src/lib/elementary/efl_access_widget_action.c
Examining data/efl-1.25.1/src/lib/elementary/efl_access_widget_action.h
Examining data/efl-1.25.1/src/lib/elementary/efl_access_window.c
Examining data/efl-1.25.1/src/lib/elementary/efl_access_window.h
Examining data/efl-1.25.1/src/lib/elementary/efl_datetime_manager.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_action_connector.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_alert_popup.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_alert_popup_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_average_model.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_bg.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_bg_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_bg_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_bg_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_bg_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_bg_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_box.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_box_flow.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_box_layout.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_box_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_box_stack.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_button.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_button_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_button_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_button_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_button_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_button_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_button_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_caching_factory.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_calendar_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_check.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_check_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_check_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_check_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_check_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_check_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_check_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_check_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_clock.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_clock_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_collection.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_collection_view.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_container_layout.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_container_layout.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_datepicker.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_datepicker_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_default_item.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_dnd.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_exact_model.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_flip.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_flip_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_flip_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_flip_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_flip_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_flip_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_flip_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_flip_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_composition.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_graph.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_graph.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_layer.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_manager.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_manager_calc.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_manager_root_focus.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_manager_sub.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_object.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_parent_provider.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_parent_provider_gen.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_parent_provider_gen_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_parent_provider_gen_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_parent_provider_standard.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_focus_util.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_format.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_frame.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_frame_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_frame_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_frame_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_frame_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_frame_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_frame_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_frame_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_grid.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_grid_default_item.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_grid_view.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_group_item.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_homogeneous_model.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_factory.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_zoomable.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_zoomable_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_zoomable_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_zoomable_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_zoomable_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_zoomable_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_zoomable_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_image_zoomable_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_interactive.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_interactive.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_scroller.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_scroller.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_item.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_item_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_layout_factory.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_layout_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_layout_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_layout_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_layout_pack.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_legacy.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_list.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_list_default_item.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_list_placeholder_item.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_list_view.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_navigation_bar.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_navigation_bar_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_navigation_layout.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_navigation_layout_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_pager.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_pan.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_panel.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_panel_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_panes.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_panes_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_panes_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_panes_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_panes_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_panes_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_panes_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_panes_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_popup.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_popup_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_position_manager_common.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_position_manager_entity.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_position_manager_grid.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_position_manager_list.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_progressbar.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_progressbar_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_progressbar_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_progressbar_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_progressbar_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_progressbar_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_radio.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_radio_box.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_radio_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_radio_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_radio_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_radio_group_impl.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_radio_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_radio_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_radio_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_radio_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_relative_container.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_relative_container_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_scroll_manager.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_scroll_util.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_scroller.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_select_model.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_selection.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_selection_manager_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_separator.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_size_model.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_slider.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_slider_interval.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_slider_interval_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_slider_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spin.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spin_button.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spin_button_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spin_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spotlight_animation_manager.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spotlight_container.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spotlight_fade_manager.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spotlight_icon_indicator.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spotlight_indicator.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spotlight_manager.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spotlight_plain_manager.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spotlight_scroll_manager.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_spotlight_util.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_stack.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_tab_bar.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_tab_bar_default_item.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_tab_bar_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_tab_page.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_tab_page_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_tab_pager.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_tab_pager_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_table.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_table_layout.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_table_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_table_static.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_tags.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_tags_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_text_factory_emoticons.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_text_factory_fallback.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_text_factory_images.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_textbox.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_textpath.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_textpath_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_textpath_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_textpath_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_textpath_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_textpath_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_timepicker.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_timepicker_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_vg_animation.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_vg_animation.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_vg_animation_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_vg_animation_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_vg_animation_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_vg_animation_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_video.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_video.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_video_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_video_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_video_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_video_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_video_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_video_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_video_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_video_private.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_view_model.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_common.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_common.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_factory.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_flip.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_focus_manager.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_frame.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_image.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_pan.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_scroll_manager.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_scrollable_content.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_widget_scroller.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win_inlined.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win_inlined_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win_inlined_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win_inlined_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win_socket.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win_socket_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win_socket_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/efl_ui_win_socket_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elc_combobox.c
Examining data/efl-1.25.1/src/lib/elementary/elc_combobox.h
Examining data/efl-1.25.1/src/lib/elementary/elc_combobox_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elc_ctxpopup.c
Examining data/efl-1.25.1/src/lib/elementary/elc_ctxpopup.h
Examining data/efl-1.25.1/src/lib/elementary/elc_ctxpopup_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elc_fileselector.c
Examining data/efl-1.25.1/src/lib/elementary/elc_fileselector.h
Examining data/efl-1.25.1/src/lib/elementary/elc_fileselector_button.c
Examining data/efl-1.25.1/src/lib/elementary/elc_fileselector_button.h
Examining data/efl-1.25.1/src/lib/elementary/elc_fileselector_button_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elc_fileselector_common.h
Examining data/efl-1.25.1/src/lib/elementary/elc_fileselector_entry.c
Examining data/efl-1.25.1/src/lib/elementary/elc_fileselector_entry.h
Examining data/efl-1.25.1/src/lib/elementary/elc_fileselector_entry_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elc_fileselector_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elc_hoversel.c
Examining data/efl-1.25.1/src/lib/elementary/elc_hoversel.h
Examining data/efl-1.25.1/src/lib/elementary/elc_hoversel_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry.c
Examining data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry.h
Examining data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry_common.h
Examining data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elc_naviframe.c
Examining data/efl-1.25.1/src/lib/elementary/elc_naviframe.h
Examining data/efl-1.25.1/src/lib/elementary/elc_naviframe_common.h
Examining data/efl-1.25.1/src/lib/elementary/elc_naviframe_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elc_player.c
Examining data/efl-1.25.1/src/lib/elementary/elc_popup.c
Examining data/efl-1.25.1/src/lib/elementary/elc_popup.h
Examining data/efl-1.25.1/src/lib/elementary/elc_popup_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elc_scrolled_entry.c
Examining data/efl-1.25.1/src/lib/elementary/elementary_config.h
Examining data/efl-1.25.1/src/lib/elementary/elementary_js.cc
Examining data/efl-1.25.1/src/lib/elementary/elm_access.c
Examining data/efl-1.25.1/src/lib/elementary/elm_access.h
Examining data/efl-1.25.1/src/lib/elementary/elm_access_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_access_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_access_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_actionslider.c
Examining data/efl-1.25.1/src/lib/elementary/elm_actionslider.h
Examining data/efl-1.25.1/src/lib/elementary/elm_actionslider_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_actionslider_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_actionslider_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_actionslider_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_actionslider_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_app.h
Examining data/efl-1.25.1/src/lib/elementary/elm_atspi_app_object.c
Examining data/efl-1.25.1/src/lib/elementary/elm_atspi_app_object.h
Examining data/efl-1.25.1/src/lib/elementary/elm_atspi_app_object_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_atspi_app_object_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_atspi_app_object_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_atspi_bridge.c
Examining data/efl-1.25.1/src/lib/elementary/elm_atspi_bridge.h
Examining data/efl-1.25.1/src/lib/elementary/elm_atspi_bridge_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_atspi_bridge_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_atspi_bridge_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_atspi_bridge_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_authors.h
Examining data/efl-1.25.1/src/lib/elementary/elm_bg.h
Examining data/efl-1.25.1/src/lib/elementary/elm_bg_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_box.c
Examining data/efl-1.25.1/src/lib/elementary/elm_box.h
Examining data/efl-1.25.1/src/lib/elementary/elm_box_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_box_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_box_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_box_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_box_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_box_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_bubble.c
Examining data/efl-1.25.1/src/lib/elementary/elm_bubble.h
Examining data/efl-1.25.1/src/lib/elementary/elm_bubble_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_bubble_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_bubble_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_bubble_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_bubble_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_button.h
Examining data/efl-1.25.1/src/lib/elementary/elm_button_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_cache.h
Examining data/efl-1.25.1/src/lib/elementary/elm_calendar.c
Examining data/efl-1.25.1/src/lib/elementary/elm_calendar.h
Examining data/efl-1.25.1/src/lib/elementary/elm_calendar_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_calendar_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_calendar_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_calendar_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_calendar_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_calendar_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_calendar_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_calendar_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_calendar_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_check.h
Examining data/efl-1.25.1/src/lib/elementary/elm_check_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_clock.c
Examining data/efl-1.25.1/src/lib/elementary/elm_clock.h
Examining data/efl-1.25.1/src/lib/elementary/elm_clock_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_clock_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_clock_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_clock_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_clock_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_cnp.c
Examining data/efl-1.25.1/src/lib/elementary/elm_cnp.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_diff_widget.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_diff_widget.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_file.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_file.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_indent.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_indent.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_line.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_line.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_parse.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_parse.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_private.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_syntax.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_syntax.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_text.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_text.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget_legacy_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget_legacy_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget_legacy_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget_private.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget_selection.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget_selection.h
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget_text.c
Examining data/efl-1.25.1/src/lib/elementary/elm_code_widget_undo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_color_class.c
Examining data/efl-1.25.1/src/lib/elementary/elm_color_class.h
Examining data/efl-1.25.1/src/lib/elementary/elm_color_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_color_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_color_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_color_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_colorselector.c
Examining data/efl-1.25.1/src/lib/elementary/elm_colorselector.h
Examining data/efl-1.25.1/src/lib/elementary/elm_colorselector_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_colorselector_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_colorselector_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_colorselector_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_colorselector_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_colorselector_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_config.c
Examining data/efl-1.25.1/src/lib/elementary/elm_config.h
Examining data/efl-1.25.1/src/lib/elementary/elm_conform.c
Examining data/efl-1.25.1/src/lib/elementary/elm_conform.h
Examining data/efl-1.25.1/src/lib/elementary/elm_conform_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_conformant_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_conformant_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_conformant_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_ctxpopup_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_ctxpopup_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_ctxpopup_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_ctxpopup_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_ctxpopup_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_ctxpopup_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_ctxpopup_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_ctxpopup_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_cursor.h
Examining data/efl-1.25.1/src/lib/elementary/elm_datetime.c
Examining data/efl-1.25.1/src/lib/elementary/elm_datetime.h
Examining data/efl-1.25.1/src/lib/elementary/elm_dayselector.c
Examining data/efl-1.25.1/src/lib/elementary/elm_dayselector.h
Examining data/efl-1.25.1/src/lib/elementary/elm_dayselector_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_dayselector_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_dayselector_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_dayselector_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_dayselector_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_dayselector_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_dayselector_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_dayselector_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_dbus_menu.c
Examining data/efl-1.25.1/src/lib/elementary/elm_debug.h
Examining data/efl-1.25.1/src/lib/elementary/elm_deprecated.h
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector.c
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector.h
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_diskselector_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_dnd.c
Examining data/efl-1.25.1/src/lib/elementary/elm_entry.c
Examining data/efl-1.25.1/src/lib/elementary/elm_entry.h
Examining data/efl-1.25.1/src/lib/elementary/elm_entry_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_entry_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_entry_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_entry_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_entry_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_entry_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_factory.c
Examining data/efl-1.25.1/src/lib/elementary/elm_factory.h
Examining data/efl-1.25.1/src/lib/elementary/elm_fileselector_button_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_fileselector_button_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_fileselector_button_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_fileselector_entry_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_fileselector_entry_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_fileselector_entry_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_fileselector_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_fileselector_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_fileselector_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_fileselector_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_finger.h
Examining data/efl-1.25.1/src/lib/elementary/elm_flip.h
Examining data/efl-1.25.1/src/lib/elementary/elm_flipselector.c
Examining data/efl-1.25.1/src/lib/elementary/elm_flipselector.h
Examining data/efl-1.25.1/src/lib/elementary/elm_flipselector_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_flipselector_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_flipselector_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_flipselector_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_flipselector_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_flipselector_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_flipselector_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_flipselector_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_flipselector_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_focus.h
Examining data/efl-1.25.1/src/lib/elementary/elm_focus_item.h
Examining data/efl-1.25.1/src/lib/elementary/elm_focus_legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_font.c
Examining data/efl-1.25.1/src/lib/elementary/elm_font.h
Examining data/efl-1.25.1/src/lib/elementary/elm_frame.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gen.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gen_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_general.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid.c
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_pan_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_pan_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gengrid_pan_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist.c
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist.h
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_pan_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_pan_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_genlist_pan_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c
Examining data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gesture_layer_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gesture_layer_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_gesture_layer_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gesture_layer_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_gesture_layer_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_gesture_layer_extra_gestures.c
Examining data/efl-1.25.1/src/lib/elementary/elm_gesture_layer_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_getting_started.h
Examining data/efl-1.25.1/src/lib/elementary/elm_glview.c
Examining data/efl-1.25.1/src/lib/elementary/elm_glview.h
Examining data/efl-1.25.1/src/lib/elementary/elm_glview_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_glview_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_glview_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_glview_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_glview_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_glview_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_grid.c
Examining data/efl-1.25.1/src/lib/elementary/elm_grid.h
Examining data/efl-1.25.1/src/lib/elementary/elm_grid_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_grid_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_grid_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_grid_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_grid_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_helper.c
Examining data/efl-1.25.1/src/lib/elementary/elm_helper.h
Examining data/efl-1.25.1/src/lib/elementary/elm_hover.c
Examining data/efl-1.25.1/src/lib/elementary/elm_hover.h
Examining data/efl-1.25.1/src/lib/elementary/elm_hover_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_hover_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_hover_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_hover_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_hover_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_hoversel_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_hoversel_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_hoversel_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_hoversel_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_hoversel_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_hoversel_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_hoversel_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_hoversel_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_icon.c
Examining data/efl-1.25.1/src/lib/elementary/elm_icon.h
Examining data/efl-1.25.1/src/lib/elementary/elm_icon_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_icon_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_icon_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_icon_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_image.h
Examining data/efl-1.25.1/src/lib/elementary/elm_image_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_image_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_index.c
Examining data/efl-1.25.1/src/lib/elementary/elm_index.h
Examining data/efl-1.25.1/src/lib/elementary/elm_index_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_index_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_index_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_index_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_index_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_index_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_index_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_index_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_index_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_interface_fileselector.c
Examining data/efl-1.25.1/src/lib/elementary/elm_interface_fileselector.h
Examining data/efl-1.25.1/src/lib/elementary/elm_interface_fileselector_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_interface_fileselector_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_interface_fileselector_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_interface_scrollable.c
Examining data/efl-1.25.1/src/lib/elementary/elm_interface_scrollable.h
Examining data/efl-1.25.1/src/lib/elementary/elm_interfaces.h
Examining data/efl-1.25.1/src/lib/elementary/elm_inwin.c
Examining data/efl-1.25.1/src/lib/elementary/elm_inwin.h
Examining data/efl-1.25.1/src/lib/elementary/elm_inwin_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_inwin_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_inwin_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_inwin_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_inwin_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_label.c
Examining data/efl-1.25.1/src/lib/elementary/elm_label.h
Examining data/efl-1.25.1/src/lib/elementary/elm_label_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_label_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_label_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_label_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_label_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_layout.h
Examining data/efl-1.25.1/src/lib/elementary/elm_layout_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_layout_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_list.c
Examining data/efl-1.25.1/src/lib/elementary/elm_list.h
Examining data/efl-1.25.1/src/lib/elementary/elm_list_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_list_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_list_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_list_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_list_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_list_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_list_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_list_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_list_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_macros.h
Examining data/efl-1.25.1/src/lib/elementary/elm_main.c
Examining data/efl-1.25.1/src/lib/elementary/elm_map.c
Examining data/efl-1.25.1/src/lib/elementary/elm_map.h
Examining data/efl-1.25.1/src/lib/elementary/elm_map_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_map_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_map_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_map_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_map_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_map_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_map_pan_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_map_pan_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_map_pan_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_mapbuf.c
Examining data/efl-1.25.1/src/lib/elementary/elm_mapbuf.h
Examining data/efl-1.25.1/src/lib/elementary/elm_mapbuf_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_mapbuf_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_mapbuf_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_mapbuf_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_mapbuf_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_menu.c
Examining data/efl-1.25.1/src/lib/elementary/elm_menu.h
Examining data/efl-1.25.1/src/lib/elementary/elm_menu_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_menu_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_menu_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_menu_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_menu_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_menu_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_menu_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_menu_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_menu_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_mirroring.h
Examining data/efl-1.25.1/src/lib/elementary/elm_module.c
Examining data/efl-1.25.1/src/lib/elementary/elm_module_helper.h
Examining data/efl-1.25.1/src/lib/elementary/elm_multibuttonentry_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_multibuttonentry_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_multibuttonentry_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_multibuttonentry_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_multibuttonentry_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_multibuttonentry_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_multibuttonentry_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_multibuttonentry_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_naviframe_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_naviframe_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_naviframe_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_naviframe_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_naviframe_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_naviframe_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_naviframe_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_naviframe_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_need.h
Examining data/efl-1.25.1/src/lib/elementary/elm_notify.c
Examining data/efl-1.25.1/src/lib/elementary/elm_notify.h
Examining data/efl-1.25.1/src/lib/elementary/elm_notify_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_notify_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_notify_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_notify_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_notify_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_notify_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_object.h
Examining data/efl-1.25.1/src/lib/elementary/elm_object_item.h
Examining data/efl-1.25.1/src/lib/elementary/elm_pan_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_pan_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_pan_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_pan_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_panel.c
Examining data/efl-1.25.1/src/lib/elementary/elm_panel.h
Examining data/efl-1.25.1/src/lib/elementary/elm_panel_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_panel_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_panel_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_panel_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_panel_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_panel_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_panes.h
Examining data/efl-1.25.1/src/lib/elementary/elm_panes_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_part_helper.h
Examining data/efl-1.25.1/src/lib/elementary/elm_photo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_photo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_photo_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_photo_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_photo_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_photo_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_photocam.h
Examining data/efl-1.25.1/src/lib/elementary/elm_photocam_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_player_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_player_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_player_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_plug.c
Examining data/efl-1.25.1/src/lib/elementary/elm_plug.h
Examining data/efl-1.25.1/src/lib/elementary/elm_plug_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_plug_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_plug_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_plug_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_plug_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_popup_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_popup_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_popup_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_popup_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_popup_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_popup_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_popup_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_prefs.c
Examining data/efl-1.25.1/src/lib/elementary/elm_prefs.h
Examining data/efl-1.25.1/src/lib/elementary/elm_prefs_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_prefs_data.c
Examining data/efl-1.25.1/src/lib/elementary/elm_prefs_data.h
Examining data/efl-1.25.1/src/lib/elementary/elm_prefs_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_prefs_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_prefs_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_prefs_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_prefs_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_priv.h
Examining data/efl-1.25.1/src/lib/elementary/elm_progressbar.h
Examining data/efl-1.25.1/src/lib/elementary/elm_progressbar_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_progressbar_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_radio.h
Examining data/efl-1.25.1/src/lib/elementary/elm_radio_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_removed.h
Examining data/efl-1.25.1/src/lib/elementary/elm_route.c
Examining data/efl-1.25.1/src/lib/elementary/elm_route.h
Examining data/efl-1.25.1/src/lib/elementary/elm_route_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_route_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_route_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_route_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_route_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_scale.h
Examining data/efl-1.25.1/src/lib/elementary/elm_scroll.h
Examining data/efl-1.25.1/src/lib/elementary/elm_scroller.c
Examining data/efl-1.25.1/src/lib/elementary/elm_scroller.h
Examining data/efl-1.25.1/src/lib/elementary/elm_scroller_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_scroller_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_scroller_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_scroller_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_scroller_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_segment_control.c
Examining data/efl-1.25.1/src/lib/elementary/elm_segment_control.h
Examining data/efl-1.25.1/src/lib/elementary/elm_segment_control_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_segment_control_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_segment_control_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_segment_control_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_segment_control_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_segment_control_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_segment_control_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_segment_control_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_segment_control_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_separator.c
Examining data/efl-1.25.1/src/lib/elementary/elm_separator.h
Examining data/efl-1.25.1/src/lib/elementary/elm_separator_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_separator_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_separator_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_separator_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_separator_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slider.c
Examining data/efl-1.25.1/src/lib/elementary/elm_slider.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slider_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slider_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_slider_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slider_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slider_part_indicator_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_slider_part_indicator_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slider_part_indicator_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow.c
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_slideshow_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_spinner.c
Examining data/efl-1.25.1/src/lib/elementary/elm_spinner.h
Examining data/efl-1.25.1/src/lib/elementary/elm_spinner_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_spinner_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_spinner_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_spinner_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_spinner_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_store.c
Examining data/efl-1.25.1/src/lib/elementary/elm_store.h
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify.c
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify.h
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_dbus.c
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_dbus_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_dbus_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_dbus_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_interface.c
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_interface_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_interface_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_interface_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_sys_notify_interface_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_systray.c
Examining data/efl-1.25.1/src/lib/elementary/elm_systray.h
Examining data/efl-1.25.1/src/lib/elementary/elm_systray_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_systray_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_systray_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_systray_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_systray_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_systray_watcher.c
Examining data/efl-1.25.1/src/lib/elementary/elm_systray_watcher.h
Examining data/efl-1.25.1/src/lib/elementary/elm_table.c
Examining data/efl-1.25.1/src/lib/elementary/elm_table.h
Examining data/efl-1.25.1/src/lib/elementary/elm_table_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_table_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_table_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_table_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_table_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_textpath.h
Examining data/efl-1.25.1/src/lib/elementary/elm_textpath_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_theme.c
Examining data/efl-1.25.1/src/lib/elementary/elm_theme.h
Examining data/efl-1.25.1/src/lib/elementary/elm_thumb.c
Examining data/efl-1.25.1/src/lib/elementary/elm_thumb.h
Examining data/efl-1.25.1/src/lib/elementary/elm_thumb_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_thumb_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_thumb_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_thumb_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_thumb_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar.c
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar.h
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_toolbar_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_tooltip.h
Examining data/efl-1.25.1/src/lib/elementary/elm_transit.c
Examining data/efl-1.25.1/src/lib/elementary/elm_transit.h
Examining data/efl-1.25.1/src/lib/elementary/elm_util.c
Examining data/efl-1.25.1/src/lib/elementary/elm_view_form.c
Examining data/efl-1.25.1/src/lib/elementary/elm_view_form.h
Examining data/efl-1.25.1/src/lib/elementary/elm_view_form_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_view_form_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_view_form_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_view_list.c
Examining data/efl-1.25.1/src/lib/elementary/elm_view_list.h
Examining data/efl-1.25.1/src/lib/elementary/elm_view_list_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_view_list_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_view_list_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_web.h
Examining data/efl-1.25.1/src/lib/elementary/elm_web2.c
Examining data/efl-1.25.1/src/lib/elementary/elm_web_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_web_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_web_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_web_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_web_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_web_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_actionslider.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_box.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_bubble.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_calendar.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_clock.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_colorselector.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_combobox.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_conform.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_container.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_ctxpopup.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_dayselector.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_diskselector.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_entry.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_fileselector.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_fileselector_button.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_fileselector_entry.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_flipselector.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_gengrid.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_genlist.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_glview.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_grid.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_hover.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_hoversel.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_icon.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_index.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_inwin.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_item_container_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_item_container_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_item_container_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_item_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_item_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_item_eo.legacy.c
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_item_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_item_static_focus.c
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_item_static_focus_eo.c
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_item_static_focus_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_item_static_focus_eo.legacy.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_label.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_layout.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_list.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_map.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_mapbuf.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_menu.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_multibuttonentry.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_naviframe.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_notify.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_panel.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_photo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_player.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_plug.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_popup.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_prefs.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_route.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_scroller.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_segment_control.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_separator.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_slider.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_slideshow.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_spinner.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_table.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_thumb.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_toolbar.h
Examining data/efl-1.25.1/src/lib/elementary/elm_widget_web.h
Examining data/efl-1.25.1/src/lib/elementary/elm_win.h
Examining data/efl-1.25.1/src/lib/elementary/elm_win_common.h
Examining data/efl-1.25.1/src/lib/elementary/elm_win_eo.h
Examining data/efl-1.25.1/src/lib/elementary/elm_win_legacy.h
Examining data/efl-1.25.1/src/lib/elementary/els_box.c
Examining data/efl-1.25.1/src/lib/elementary/els_box.h
Examining data/efl-1.25.1/src/lib/elementary/els_cursor.c
Examining data/efl-1.25.1/src/lib/elementary/els_tooltip.c
Examining data/efl-1.25.1/src/lib/elementary/elu_ews_wm.c
Examining data/efl-1.25.1/src/lib/elput/Elput.h
Examining data/efl-1.25.1/src/lib/elput/elput.c
Examining data/efl-1.25.1/src/lib/elput/elput_evdev.c
Examining data/efl-1.25.1/src/lib/elput/elput_input.c
Examining data/efl-1.25.1/src/lib/elput/elput_logind.c
Examining data/efl-1.25.1/src/lib/elput/elput_manager.c
Examining data/efl-1.25.1/src/lib/elput/elput_private.h
Examining data/efl-1.25.1/src/lib/elput/elput_touch.c
Examining data/efl-1.25.1/src/lib/elua/Elua.h
Examining data/efl-1.25.1/src/lib/elua/cache.c
Examining data/efl-1.25.1/src/lib/elua/elua.c
Examining data/efl-1.25.1/src/lib/elua/elua_private.h
Examining data/efl-1.25.1/src/lib/elua/io.c
Examining data/efl-1.25.1/src/lib/embryo/Embryo.h
Examining data/efl-1.25.1/src/lib/embryo/embryo_amx.c
Examining data/efl-1.25.1/src/lib/embryo/embryo_args.c
Examining data/efl-1.25.1/src/lib/embryo/embryo_float.c
Examining data/efl-1.25.1/src/lib/embryo/embryo_main.c
Examining data/efl-1.25.1/src/lib/embryo/embryo_private.h
Examining data/efl-1.25.1/src/lib/embryo/embryo_rand.c
Examining data/efl-1.25.1/src/lib/embryo/embryo_str.c
Examining data/efl-1.25.1/src/lib/embryo/embryo_time.c
Examining data/efl-1.25.1/src/lib/emile/Emile.h
Examining data/efl-1.25.1/src/lib/emile/emile_base64.c
Examining data/efl-1.25.1/src/lib/emile/emile_base64.h
Examining data/efl-1.25.1/src/lib/emile/emile_cipher.c
Examining data/efl-1.25.1/src/lib/emile/emile_cipher.h
Examining data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c
Examining data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c
Examining data/efl-1.25.1/src/lib/emile/emile_compress.c
Examining data/efl-1.25.1/src/lib/emile/emile_compress.h
Examining data/efl-1.25.1/src/lib/emile/emile_image.c
Examining data/efl-1.25.1/src/lib/emile/emile_image.h
Examining data/efl-1.25.1/src/lib/emile/emile_main.c
Examining data/efl-1.25.1/src/lib/emile/emile_private.h
Examining data/efl-1.25.1/src/lib/emotion/Emotion.h
Examining data/efl-1.25.1/src/lib/emotion/Emotion_Eo.h
Examining data/efl-1.25.1/src/lib/emotion/Emotion_Legacy.h
Examining data/efl-1.25.1/src/lib/emotion/efl_canvas_video_eo.legacy.c
Examining data/efl-1.25.1/src/lib/emotion/efl_canvas_video_eo.legacy.h
Examining data/efl-1.25.1/src/lib/emotion/emotion_main.c
Examining data/efl-1.25.1/src/lib/emotion/emotion_modules.c
Examining data/efl-1.25.1/src/lib/emotion/emotion_modules.h
Examining data/efl-1.25.1/src/lib/emotion/emotion_private.h
Examining data/efl-1.25.1/src/lib/emotion/emotion_smart.c
Examining data/efl-1.25.1/src/lib/emotion/emotion_webcam.c
Examining data/efl-1.25.1/src/lib/eo/Eo.h
Examining data/efl-1.25.1/src/lib/eo/eo.c
Examining data/efl-1.25.1/src/lib/eo/eo_add_fallback.c
Examining data/efl-1.25.1/src/lib/eo/eo_add_fallback.h
Examining data/efl-1.25.1/src/lib/eo/eo_base_class.c
Examining data/efl-1.25.1/src/lib/eo/eo_class_class.c
Examining data/efl-1.25.1/src/lib/eo/eo_internal.h
Examining data/efl-1.25.1/src/lib/eo/eo_private.h
Examining data/efl-1.25.1/src/lib/eo/eo_ptr_indirection.c
Examining data/efl-1.25.1/src/lib/eo/eo_ptr_indirection.h
Examining data/efl-1.25.1/src/lib/eolian/Eolian.h
Examining data/efl-1.25.1/src/lib/eolian/Eolian_Aux.h
Examining data/efl-1.25.1/src/lib/eolian/database_check.c
Examining data/efl-1.25.1/src/lib/eolian/database_class.c
Examining data/efl-1.25.1/src/lib/eolian/database_class_api.c
Examining data/efl-1.25.1/src/lib/eolian/database_constructor.c
Examining data/efl-1.25.1/src/lib/eolian/database_constructor_api.c
Examining data/efl-1.25.1/src/lib/eolian/database_event.c
Examining data/efl-1.25.1/src/lib/eolian/database_event_api.c
Examining data/efl-1.25.1/src/lib/eolian/database_expr.c
Examining data/efl-1.25.1/src/lib/eolian/database_expr_api.c
Examining data/efl-1.25.1/src/lib/eolian/database_function.c
Examining data/efl-1.25.1/src/lib/eolian/database_function_api.c
Examining data/efl-1.25.1/src/lib/eolian/database_function_parameter.c
Examining data/efl-1.25.1/src/lib/eolian/database_function_parameter_api.c
Examining data/efl-1.25.1/src/lib/eolian/database_implement.c
Examining data/efl-1.25.1/src/lib/eolian/database_implement_api.c
Examining data/efl-1.25.1/src/lib/eolian/database_part.c
Examining data/efl-1.25.1/src/lib/eolian/database_part_api.c
Examining data/efl-1.25.1/src/lib/eolian/database_type.c
Examining data/efl-1.25.1/src/lib/eolian/database_type_api.c
Examining data/efl-1.25.1/src/lib/eolian/database_validate.c
Examining data/efl-1.25.1/src/lib/eolian/database_var.c
Examining data/efl-1.25.1/src/lib/eolian/database_var_api.c
Examining data/efl-1.25.1/src/lib/eolian/eo_lexer.c
Examining data/efl-1.25.1/src/lib/eolian/eo_lexer.h
Examining data/efl-1.25.1/src/lib/eolian/eo_parser.c
Examining data/efl-1.25.1/src/lib/eolian/eo_parser.h
Examining data/efl-1.25.1/src/lib/eolian/eolian.c
Examining data/efl-1.25.1/src/lib/eolian/eolian_aux.c
Examining data/efl-1.25.1/src/lib/eolian/eolian_database.c
Examining data/efl-1.25.1/src/lib/eolian/eolian_database.h
Examining data/efl-1.25.1/src/lib/eolian/eolian_priv.h
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/address_of.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/alternative.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/attribute_conditional.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/attribute_reorder.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/attribute_replace.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/attributes.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/base_class_definition.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/blacklist.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/c_type.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/case.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/class_declaration.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/class_definition.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/class_implementation.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/container.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/context.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/converting_argument.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/counter.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/eps.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/function_declaration.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/function_definition.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/generator.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/header.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/header_guards.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/header_include_directive.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/html_escaped_string.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/ignore_warning.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/impl_header.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/implementation_include_directive.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/indentation.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/integral.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/keyword.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/klass_def.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/kleene.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/list.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/meta.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/namespace.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/parameter.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/part_declaration.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/part_implementation.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/qualifier_def.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/sequence.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/string.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/type.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/type_function_declaration.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/type_impl.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/type_traits.hpp
Examining data/efl-1.25.1/src/lib/eolian_cxx/grammar/types_definition.hpp
Examining data/efl-1.25.1/src/lib/ephysics/EPhysics.h
Examining data/efl-1.25.1/src/lib/ephysics/ephysics_body.cpp
Examining data/efl-1.25.1/src/lib/ephysics/ephysics_body_materials.h
Examining data/efl-1.25.1/src/lib/ephysics/ephysics_camera.cpp
Examining data/efl-1.25.1/src/lib/ephysics/ephysics_constraints.cpp
Examining data/efl-1.25.1/src/lib/ephysics/ephysics_main.cpp
Examining data/efl-1.25.1/src/lib/ephysics/ephysics_private.h
Examining data/efl-1.25.1/src/lib/ephysics/ephysics_quaternion.cpp
Examining data/efl-1.25.1/src/lib/ephysics/ephysics_shape.cpp
Examining data/efl-1.25.1/src/lib/ephysics/ephysics_trimesh.h
Examining data/efl-1.25.1/src/lib/ephysics/ephysics_world.cpp
Examining data/efl-1.25.1/src/lib/ethumb/Ethumb.h
Examining data/efl-1.25.1/src/lib/ethumb/Ethumb_Plugin.h
Examining data/efl-1.25.1/src/lib/ethumb/ethumb.c
Examining data/efl-1.25.1/src/lib/ethumb/ethumb_private.h
Examining data/efl-1.25.1/src/lib/ethumb/md5.c
Examining data/efl-1.25.1/src/lib/ethumb/md5.h
Examining data/efl-1.25.1/src/lib/ethumb_client/Ethumb_Client.h
Examining data/efl-1.25.1/src/lib/ethumb_client/ethumb_client.c
Examining data/efl-1.25.1/src/lib/evas/Efl_Canvas.h
Examining data/efl-1.25.1/src/lib/evas/Evas.h
Examining data/efl-1.25.1/src/lib/evas/Evas_Common.h
Examining data/efl-1.25.1/src/lib/evas/Evas_Eo.h
Examining data/efl-1.25.1/src/lib/evas/Evas_GL.h
Examining data/efl-1.25.1/src/lib/evas/Evas_Internal.h
Examining data/efl-1.25.1/src/lib/evas/Evas_Legacy.h
Examining data/efl-1.25.1/src/lib/evas/Evas_Loader.h
Examining data/efl-1.25.1/src/lib/evas/cache/evas_cache.h
Examining data/efl-1.25.1/src/lib/evas/cache/evas_cache_engine_image.c
Examining data/efl-1.25.1/src/lib/evas/cache/evas_cache_image.c
Examining data/efl-1.25.1/src/lib/evas/cache/evas_preload.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_alpha_animation.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_alpha_animation_private.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_animation.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_animation_private.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_event_grabber.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_event_grabber_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_event_grabber_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_group_animation.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_group_animation_private.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_group_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_group_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_image.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_object_animation.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_object_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_object_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_parallel_group_animation.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_parallel_group_animation_private.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_proxy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_rotate_animation.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_rotate_animation_private.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_scale_animation.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_scale_animation_private.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_sequential_group_animation.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_sequential_group_animation_private.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_snapshot.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_surface.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_surface.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_surface_tbm.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_surface_wayland.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_surface_x11.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_textblock_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_textblock_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_textblock_internal.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_translate_animation.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_translate_animation_private.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_container.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_container_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_container_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_gradient.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_gradient_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_gradient_linear.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_gradient_radial.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_image.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_node.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_node_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_node_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_object.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_object_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_object_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_shape.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_shape_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_shape_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_utils.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_gfx_mapping.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_gfx_vg_value_provider.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_gfx_vg_value_provider.h
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_input_clickable.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_input_device.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_input_event.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_input_focus.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_input_hold.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_input_key.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_input_pointer.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_text_cursor_object.c
Examining data/efl-1.25.1/src/lib/evas/canvas/efl_text_formatter.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_async_events.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_box_eo.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_box_eo.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_box_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_box_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_callbacks.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_canvas_eo.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_canvas_eo.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_canvas_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_canvas_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_clip.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_data.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_device.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_events.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_events_legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_filter_mixin.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_focus.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_gl.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_grid_eo.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_grid_eo.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_grid_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_grid_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_image_eo.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_image_eo.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_image_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_image_legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_image_private.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_key.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_key_grab.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_layer.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_line_eo.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_line_eo.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_line_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_line_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_main.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_map.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_map.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_name.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_box.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_grid.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_image.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_inform.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_intercept.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_line.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_main.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_polygon.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_rectangle.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_smart.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_smart_clipped.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_table.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_text.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_object_textgrid.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_out.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_polygon_private.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_rectangle.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_render.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_smart.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_stats.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_table_eo.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_table_eo.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_table_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_table_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_text_eo.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_text_eo.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_text_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_text_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_textblock_legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_textgrid_eo.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_textgrid_eo.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_textgrid_eo.legacy.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_textgrid_eo.legacy.h
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_touch_point.c
Examining data/efl-1.25.1/src/lib/evas/canvas/evas_vg_private.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_blend.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_blend_main.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_blend_private.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_blit_main.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_common_generic_cache.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_color.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_color.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_colorspace.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_colorspace.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_gry_1.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_gry_1.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_gry_8.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_gry_8.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_grypal_6.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_grypal_6.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_main.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_main.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_rgb_16.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_rgb_16.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_rgb_24.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_rgb_24.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_rgb_32.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_rgb_32.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_rgb_8.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_rgb_8.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_yuv.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_convert_yuv.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_cpu.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_draw.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_draw_main.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_font.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_font_compress.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_font_compress_draw.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_font_draw.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_font_draw.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_font_load.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_font_main.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_font_ot.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_font_ot.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_font_private.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_font_query.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_image.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_image_data.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_image_load.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_image_main.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_image_private.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_image_save.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_line.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_line_main.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_map_image.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_map_image.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_map_image_core.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_map_image_internal.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_map_image_internal_high.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_map_image_loop.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_add/op_add_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_add/op_add_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_add/op_add_mask_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_add/op_add_mask_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_add/op_add_pixel_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_add/op_add_pixel_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_add/op_add_pixel_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_add/op_add_pixel_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_add/op_add_pixel_mask_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_add/op_add_pixel_mask_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_add_main_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_color_neon.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_color_sse3.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_mask_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_mask_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_mask_color_neon.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_mask_color_sse3.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_master_sse3.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_color_neon.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_color_sse3.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_mask_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_mask_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_mask_neon.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_mask_sse3.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_neon.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend/op_blend_pixel_sse3.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_blend_main_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_color_neon.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_mask_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_mask_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_mask_color_neon.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_pixel_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_pixel_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_pixel_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_pixel_color_neon.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_pixel_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_pixel_mask_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_pixel_mask_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_pixel_mask_neon.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_pixel_neon.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_copy_main_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mask/op_mask_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mask/op_mask_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mask/op_mask_mask_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mask/op_mask_mask_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mask/op_mask_pixel_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mask/op_mask_pixel_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mask/op_mask_pixel_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mask/op_mask_pixel_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mask/op_mask_pixel_mask_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mask/op_mask_pixel_mask_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mask_main_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mul/op_mul_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mul/op_mul_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mul/op_mul_mask_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mul/op_mul_mask_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mul/op_mul_pixel_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mul/op_mul_pixel_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mul/op_mul_pixel_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mul/op_mul_pixel_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mul/op_mul_pixel_mask_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mul/op_mul_pixel_mask_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_mul_main_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_sub/op_sub_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_sub/op_sub_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_sub/op_sub_mask_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_sub/op_sub_mask_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_sub/op_sub_pixel_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_sub/op_sub_pixel_color_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_sub/op_sub_pixel_color_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_sub/op_sub_pixel_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_sub/op_sub_pixel_mask_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_sub/op_sub_pixel_mask_i386.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_op_sub_main_.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_pipe.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_pipe.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_polygon.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_polygon_main.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_rectangle.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_rectangle_main.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_main.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_main.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_sample.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_smooth.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_smooth.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_smooth_scaler.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_smooth_scaler_down.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_smooth_scaler_downx.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_smooth_scaler_downx_downy.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_smooth_scaler_downy.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_smooth_scaler_noscale.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_smooth_scaler_up.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_span.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_scale_span.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_text_utils.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_text_utils.h
Examining data/efl-1.25.1/src/lib/evas/common/evas_thread_render.c
Examining data/efl-1.25.1/src/lib/evas/common/evas_tiler.c
Examining data/efl-1.25.1/src/lib/evas/common/language/evas_bidi_utils.c
Examining data/efl-1.25.1/src/lib/evas/common/language/evas_bidi_utils.h
Examining data/efl-1.25.1/src/lib/evas/common/language/evas_language_utils.c
Examining data/efl-1.25.1/src/lib/evas/common/language/evas_language_utils.h
Examining data/efl-1.25.1/src/lib/evas/common/language/evas_script_table.h
Examining data/efl-1.25.1/src/lib/evas/common/region.c
Examining data/efl-1.25.1/src/lib/evas/common/region.h
Examining data/efl-1.25.1/src/lib/evas/file/evas_module.c
Examining data/efl-1.25.1/src/lib/evas/file/evas_module.h
Examining data/efl-1.25.1/src/lib/evas/file/evas_path.c
Examining data/efl-1.25.1/src/lib/evas/file/evas_path.h
Examining data/efl-1.25.1/src/lib/evas/filters/evas_filter.c
Examining data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c
Examining data/efl-1.25.1/src/lib/evas/filters/evas_filter_private.h
Examining data/efl-1.25.1/src/lib/evas/filters/evas_filter_utils.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_custom.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_double_tap.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_flick.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_long_press.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_manager.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_momentum.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_private.h
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_custom.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_double_tap.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_flick.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_long_press.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_momentum.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_rotate.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_tap.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_triple_tap.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_zoom.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_rotate.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_tap.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_touch.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_triple_tap.c
Examining data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_zoom.c
Examining data/efl-1.25.1/src/lib/evas/include/evas_blend_ops.h
Examining data/efl-1.25.1/src/lib/evas/include/evas_common_private.h
Examining data/efl-1.25.1/src/lib/evas/include/evas_common_types.h
Examining data/efl-1.25.1/src/lib/evas/include/evas_filter.h
Examining data/efl-1.25.1/src/lib/evas/include/evas_macros.h
Examining data/efl-1.25.1/src/lib/evas/include/evas_mmx.h
Examining data/efl-1.25.1/src/lib/evas/include/evas_options.h
Examining data/efl-1.25.1/src/lib/evas/include/evas_private.h
Examining data/efl-1.25.1/src/lib/evas/main.c
Examining data/efl-1.25.1/src/lib/evas/vg/evas_vg_cache.c
Examining data/efl-1.25.1/src/lib/evil/evil_dlfcn.c
Examining data/efl-1.25.1/src/lib/evil/evil_dlfcn.h
Examining data/efl-1.25.1/src/lib/evil/evil_fcntl.c
Examining data/efl-1.25.1/src/lib/evil/evil_fcntl.h
Examining data/efl-1.25.1/src/lib/evil/evil_langinfo.c
Examining data/efl-1.25.1/src/lib/evil/evil_langinfo.h
Examining data/efl-1.25.1/src/lib/evil/evil_locale.c
Examining data/efl-1.25.1/src/lib/evil/evil_locale.h
Examining data/efl-1.25.1/src/lib/evil/evil_macro_wrapper.h
Examining data/efl-1.25.1/src/lib/evil/evil_main.c
Examining data/efl-1.25.1/src/lib/evil/evil_main.h
Examining data/efl-1.25.1/src/lib/evil/evil_mman.c
Examining data/efl-1.25.1/src/lib/evil/evil_mman.h
Examining data/efl-1.25.1/src/lib/evil/evil_private.h
Examining data/efl-1.25.1/src/lib/evil/evil_stdio.c
Examining data/efl-1.25.1/src/lib/evil/evil_stdio.h
Examining data/efl-1.25.1/src/lib/evil/evil_stdlib.c
Examining data/efl-1.25.1/src/lib/evil/evil_stdlib.h
Examining data/efl-1.25.1/src/lib/evil/evil_string.c
Examining data/efl-1.25.1/src/lib/evil/evil_string.h
Examining data/efl-1.25.1/src/lib/evil/evil_time.c
Examining data/efl-1.25.1/src/lib/evil/evil_time.h
Examining data/efl-1.25.1/src/lib/evil/evil_unistd.c
Examining data/efl-1.25.1/src/lib/evil/evil_unistd.h
Examining data/efl-1.25.1/src/lib/evil/evil_util.c
Examining data/efl-1.25.1/src/lib/evil/evil_util.h
Examining data/efl-1.25.1/src/modules/ecore/system/systemd/ecore_system_systemd.c
Examining data/efl-1.25.1/src/modules/ecore/system/tizen/ecore_system_tizen.c
Examining data/efl-1.25.1/src/modules/ecore/system/upower/ecore_system_upower.c
Examining data/efl-1.25.1/src/modules/ecore_buffer/shm/ecore_buffer_shm.c
Examining data/efl-1.25.1/src/modules/ecore_buffer/x11_dri2/ecore_buffer_x11_dri2.c
Examining data/efl-1.25.1/src/modules/ecore_buffer/x11_dri3/ecore_buffer_x11_dri3.c
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/cocoa/ecore_evas_cocoa.c
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/drm/ecore_evas_drm.c
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn_buf.c
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn_engine.h
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/fb/ecore_evas_fb.c
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/sdl/ecore_evas_sdl.c
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/wayland/ecore_evas_wayland_common.c
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/wayland/ecore_evas_wayland_egl.c
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/wayland/ecore_evas_wayland_private.h
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/wayland/ecore_evas_wayland_shm.c
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/win32/ecore_evas_win32.c
Examining data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c
Examining data/efl-1.25.1/src/modules/ecore_evas/vnc_server/ecore_evas_vnc_server.c
Examining data/efl-1.25.1/src/modules/ecore_evas/vnc_server/ecore_evas_vnc_server_fb_keymap.c
Examining data/efl-1.25.1/src/modules/ecore_evas/vnc_server/ecore_evas_vnc_server_fb_keymap.h
Examining data/efl-1.25.1/src/modules/ecore_imf/ibus/ibus_imcontext.c
Examining data/efl-1.25.1/src/modules/ecore_imf/ibus/ibus_imcontext.h
Examining data/efl-1.25.1/src/modules/ecore_imf/ibus/ibus_module.c
Examining data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp
Examining data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.h
Examining data/efl-1.25.1/src/modules/ecore_imf/scim/scim_module.cpp
Examining data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c
Examining data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.h
Examining data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_module.c
Examining data/efl-1.25.1/src/modules/ecore_imf/xim/ecore_imf_xim.c
Examining data/efl-1.25.1/src/modules/ecore_wl2/engines/dmabuf/ecore_wl2_surface_module_dmabuf.c
Examining data/efl-1.25.1/src/modules/eeze/sensor/fake/fake.c
Examining data/efl-1.25.1/src/modules/eeze/sensor/udev/udev.c
Examining data/efl-1.25.1/src/modules/eina/mp/chained_pool/eina_chained_mempool.c
Examining data/efl-1.25.1/src/modules/eina/mp/one_big/eina_one_big.c
Examining data/efl-1.25.1/src/modules/eina/mp/pass_through/eina_pass_through.c
Examining data/efl-1.25.1/src/modules/elementary/access_output/mod.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_button.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_check.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_datetime.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_entry.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_horizontal_box.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_horizontal_frame.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_label.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_separator.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_slider.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_spinner.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_swallow.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_vertical_box.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/elm_vertical_frame.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/prefs_iface.c
Examining data/efl-1.25.1/src/modules/elementary/prefs/private.h
Examining data/efl-1.25.1/src/modules/elementary/test_entry/mod.c
Examining data/efl-1.25.1/src/modules/elementary/test_map/mod.c
Examining data/efl-1.25.1/src/modules/elementary/web/none/elm_web_none.c
Examining data/efl-1.25.1/src/modules/elementary/web/none/elm_web_none_eo.c
Examining data/efl-1.25.1/src/modules/elementary/web/none/elm_web_none_eo.h
Examining data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_alloc.c
Examining data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_convert.c
Examining data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.c
Examining data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.h
Examining data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_sink.c
Examining data/efl-1.25.1/src/modules/ethumb/emotion/emotion.c
Examining data/efl-1.25.1/src/modules/evas/engines/buffer/Evas_Engine_Buffer.h
Examining data/efl-1.25.1/src/modules/evas/engines/buffer/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/buffer/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/buffer/evas_outbuf.c
Examining data/efl-1.25.1/src/modules/evas/engines/drm/Evas_Engine_Drm.h
Examining data/efl-1.25.1/src/modules/evas/engines/drm/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/drm/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/drm/evas_outbuf.c
Examining data/efl-1.25.1/src/modules/evas/engines/eglfs/Evas_Engine_Eglfs.h
Examining data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_outbuf.c
Examining data/efl-1.25.1/src/modules/evas/engines/fb/Evas_Engine_FB.h
Examining data/efl-1.25.1/src/modules/evas/engines/fb/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/fb/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb.h
Examining data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c
Examining data/efl-1.25.1/src/modules/evas/engines/fb/evas_outbuf.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_cocoa/Evas_Engine_GL_Cocoa.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_cocoa/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_cocoa/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_3d_renderer.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_def.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_ext.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_ext.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_ext_def.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_gles1.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_gles3_def.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_common.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core_private.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_define.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_file_cache.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_font.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_image.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_line.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_polygon.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_preload.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_private.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_rectangle.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_drm/Evas_Engine_GL_Drm.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_outbuf.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/Evas_Engine_GL_Generic.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/Evas_Engine_GL_Shared.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/evas_ector_gl.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/evas_ector_gl_buffer.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/evas_ector_gl_image_buffer.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/filters/gl_engine_filter.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/filters/gl_filter_blend.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/filters/gl_filter_blur.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/filters/gl_filter_curve.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/filters/gl_filter_displace.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/filters/gl_filter_fill.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/filters/gl_filter_grayscale.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/filters/gl_filter_inverse_color.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_generic/filters/gl_filter_mask.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_sdl/Evas_Engine_GL_SDL.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_sdl/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_sdl/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_x11/Evas_Engine_GL_X11.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_ddraw/Evas_Engine_Software_DDraw.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_ddraw/evas_ddraw_buffer.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_ddraw/evas_ddraw_main.cpp
Examining data/efl-1.25.1/src/modules/evas/engines/software_ddraw/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_ddraw/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_ddraw/evas_outbuf.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_gdi/Evas_Engine_Software_Gdi.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_gdi/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_gdi/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_gdi/evas_gdi_buffer.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_gdi/evas_gdi_main.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_gdi/evas_outbuf.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/Evas_Engine_Software_Generic.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/Evas_Engine_Software_Shared.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_ector_software.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_ector_software_buffer.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_native_common.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_native_dmabuf.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_native_tbm.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/blur/blur_box_alpha_.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/blur/blur_box_alpha_i386.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/blur/blur_box_alpha_neon.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/blur/blur_box_alpha_sse3.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/blur/blur_box_rgba_.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/blur/blur_box_rgba_i386.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/blur/blur_box_rgba_neon.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/blur/blur_box_rgba_sse3.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/blur/blur_gaussian_alpha_.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/blur/blur_gaussian_rgba_.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_engine_filter.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_blend.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_blur.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_bump.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_curve.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_displace.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_fill.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_grayscale.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_inverse_color.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_mask.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_transform.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/Evas_Engine_Software_X11.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_x_egl.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_x_egl.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_buffer.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_buffer.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_color.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_color.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_dri_image.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_dri_image.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_image.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_image.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_main.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_outbuf.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_outbuf.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_swapbuf.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_swapbuf.h
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_swapper.c
Examining data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_swapper.h
Examining data/efl-1.25.1/src/modules/evas/engines/wayland_common/Evas_Engine_Wayland.h
Examining data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_wl_main.c
Examining data/efl-1.25.1/src/modules/evas/engines/wayland_shm/evas_engine.c
Examining data/efl-1.25.1/src/modules/evas/engines/wayland_shm/evas_engine.h
Examining data/efl-1.25.1/src/modules/evas/engines/wayland_shm/evas_outbuf.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/avif/evas_image_load_avif.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/bmp/evas_image_load_bmp.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/dds/evas_image_load_dds.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/dds/s3tc.h
Examining data/efl-1.25.1/src/modules/evas/image_loaders/dds/s3tc_decoder.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/eet/evas_image_load_eet.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/gif/evas_image_load_gif.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/ico/evas_image_load_ico.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/jp2k/evas_image_load_jp2k.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/jpeg/evas_image_load_jpeg.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/pmaps/evas_image_load_pmaps.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/png/evas_image_load_png.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/psd/evas_image_load_psd.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/tga/evas_image_load_tga.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/tgv/evas_image_load_tgv.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/tiff/evas_image_load_tiff.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/wbmp/evas_image_load_wbmp.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/webp/evas_image_load_webp.c
Examining data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c
Examining data/efl-1.25.1/src/modules/evas/image_savers/avif/evas_image_save_avif.c
Examining data/efl-1.25.1/src/modules/evas/image_savers/eet/evas_image_save_eet.c
Examining data/efl-1.25.1/src/modules/evas/image_savers/jpeg/evas_image_save_jpeg.c
Examining data/efl-1.25.1/src/modules/evas/image_savers/png/evas_image_save_png.c
Examining data/efl-1.25.1/src/modules/evas/image_savers/tgv/evas_image_save_tgv.c
Examining data/efl-1.25.1/src/modules/evas/image_savers/tiff/evas_image_save_tiff.c
Examining data/efl-1.25.1/src/modules/evas/image_savers/webp/evas_image_save_webp.c
Examining data/efl-1.25.1/src/modules/evas/vg_loaders/eet/evas_vg_load_eet.c
Examining data/efl-1.25.1/src/modules/evas/vg_loaders/json/evas_vg_load_json.c
Examining data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c
Examining data/efl-1.25.1/src/modules/evas/vg_savers/eet/evas_vg_save_eet.c
Examining data/efl-1.25.1/src/modules/evas/vg_savers/svg/evas_vg_save_svg.c
Examining data/efl-1.25.1/src/static_libs/atspi/atspi-constants.h
Examining data/efl-1.25.1/src/static_libs/buildsystem/buildsystem.h
Examining data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_autotools.c
Examining data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c
Examining data/efl-1.25.1/src/static_libs/draw/draw.h
Examining data/efl-1.25.1/src/static_libs/draw/draw_alpha_main.c
Examining data/efl-1.25.1/src/static_libs/draw/draw_convert.c
Examining data/efl-1.25.1/src/static_libs/draw/draw_main.c
Examining data/efl-1.25.1/src/static_libs/draw/draw_main_neon.c
Examining data/efl-1.25.1/src/static_libs/draw/draw_main_sse2.c
Examining data/efl-1.25.1/src/static_libs/draw/draw_private.h
Examining data/efl-1.25.1/src/static_libs/freetype/sw_ft_math.c
Examining data/efl-1.25.1/src/static_libs/freetype/sw_ft_math.h
Examining data/efl-1.25.1/src/static_libs/freetype/sw_ft_raster.c
Examining data/efl-1.25.1/src/static_libs/freetype/sw_ft_raster.h
Examining data/efl-1.25.1/src/static_libs/freetype/sw_ft_stroker.c
Examining data/efl-1.25.1/src/static_libs/freetype/sw_ft_stroker.h
Examining data/efl-1.25.1/src/static_libs/freetype/sw_ft_types.h
Examining data/efl-1.25.1/src/static_libs/http-parser/contrib/parsertrace.c
Examining data/efl-1.25.1/src/static_libs/http-parser/contrib/url_parser.c
Examining data/efl-1.25.1/src/static_libs/http-parser/http_parser.c
Examining data/efl-1.25.1/src/static_libs/http-parser/http_parser.h
Examining data/efl-1.25.1/src/static_libs/http-parser/test.c
Examining data/efl-1.25.1/src/static_libs/libdrm/drm.h
Examining data/efl-1.25.1/src/static_libs/libdrm/drm_fourcc.h
Examining data/efl-1.25.1/src/static_libs/libdrm/drm_mode.h
Examining data/efl-1.25.1/src/static_libs/libdrm/exynos_drm.h
Examining data/efl-1.25.1/src/static_libs/libdrm/exynos_drmif.h
Examining data/efl-1.25.1/src/static_libs/libdrm/i915_drm.h
Examining data/efl-1.25.1/src/static_libs/libdrm/intel_bufmgr.h
Examining data/efl-1.25.1/src/static_libs/libdrm/vc4_drm.h
Examining data/efl-1.25.1/src/static_libs/libdrm/xf86drm.h
Examining data/efl-1.25.1/src/static_libs/libdrm/xf86drmMode.h
Examining data/efl-1.25.1/src/static_libs/libunibreak/graphemebreak.c
Examining data/efl-1.25.1/src/static_libs/libunibreak/graphemebreak.h
Examining data/efl-1.25.1/src/static_libs/libunibreak/graphemebreakdata.c
Examining data/efl-1.25.1/src/static_libs/libunibreak/graphemebreakdef.h
Examining data/efl-1.25.1/src/static_libs/libunibreak/linebreak.c
Examining data/efl-1.25.1/src/static_libs/libunibreak/linebreak.h
Examining data/efl-1.25.1/src/static_libs/libunibreak/linebreakdata.c
Examining data/efl-1.25.1/src/static_libs/libunibreak/linebreakdef.c
Examining data/efl-1.25.1/src/static_libs/libunibreak/linebreakdef.h
Examining data/efl-1.25.1/src/static_libs/libunibreak/unibreakbase.c
Examining data/efl-1.25.1/src/static_libs/libunibreak/unibreakbase.h
Examining data/efl-1.25.1/src/static_libs/libunibreak/unibreakdef.c
Examining data/efl-1.25.1/src/static_libs/libunibreak/unibreakdef.h
Examining data/efl-1.25.1/src/static_libs/libunibreak/wordbreak.c
Examining data/efl-1.25.1/src/static_libs/libunibreak/wordbreak.h
Examining data/efl-1.25.1/src/static_libs/libunibreak/wordbreakdata.c
Examining data/efl-1.25.1/src/static_libs/libunibreak/wordbreakdef.h
Examining data/efl-1.25.1/src/static_libs/lz4/lz4.c
Examining data/efl-1.25.1/src/static_libs/lz4/lz4.h
Examining data/efl-1.25.1/src/static_libs/lz4/lz4frame.c
Examining data/efl-1.25.1/src/static_libs/lz4/lz4frame.h
Examining data/efl-1.25.1/src/static_libs/lz4/lz4frame_static.h
Examining data/efl-1.25.1/src/static_libs/lz4/lz4hc.c
Examining data/efl-1.25.1/src/static_libs/lz4/lz4hc.h
Examining data/efl-1.25.1/src/static_libs/lz4/xxhash.c
Examining data/efl-1.25.1/src/static_libs/lz4/xxhash.h
Examining data/efl-1.25.1/src/static_libs/rg_etc/etc2_encoder.c
Examining data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c
Examining data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.h
Examining data/efl-1.25.1/src/static_libs/rg_etc/rg_etc2.c
Examining data/efl-1.25.1/src/static_libs/triangulator/triangulator_simple.c
Examining data/efl-1.25.1/src/static_libs/triangulator/triangulator_simple.h
Examining data/efl-1.25.1/src/static_libs/triangulator/triangulator_stroker.c
Examining data/efl-1.25.1/src/static_libs/triangulator/triangulator_stroker.h
Examining data/efl-1.25.1/src/static_libs/vg_common/vg_common.h
Examining data/efl-1.25.1/src/static_libs/vg_common/vg_common_json.c
Examining data/efl-1.25.1/src/static_libs/vg_common/vg_common_svg.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_suite.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_suite.h
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_animator.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_args.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_ecore.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_audio.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_evas.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_evas_selection.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_fb.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_imf.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_input.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_thread_eina_thread_queue.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_x.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_idle.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_job.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_pipe.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_poller.c
Examining data/efl-1.25.1/src/tests/ecore/ecore_test_timer.c
Examining data/efl-1.25.1/src/tests/ecore/efl_app_suite.c
Examining data/efl-1.25.1/src/tests/ecore/efl_app_suite.h
Examining data/efl-1.25.1/src/tests/ecore/efl_app_test_cml.c
Examining data/efl-1.25.1/src/tests/ecore/efl_app_test_env.c
Examining data/efl-1.25.1/src/tests/ecore/efl_app_test_loop.c
Examining data/efl-1.25.1/src/tests/ecore/efl_app_test_loop_fd.c
Examining data/efl-1.25.1/src/tests/ecore/efl_app_test_loop_timer.c
Examining data/efl-1.25.1/src/tests/ecore/efl_app_test_promise.c
Examining data/efl-1.25.1/src/tests/ecore_audio_cxx/cxx_compile_test.cc
Examining data/efl-1.25.1/src/tests/ecore_con/ecore_con_suite.c
Examining data/efl-1.25.1/src/tests/ecore_con/ecore_con_suite.h
Examining data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c
Examining data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con_eet.c
Examining data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con_url.c
Examining data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c
Examining data/efl-1.25.1/src/tests/ecore_cxx/cxx_compile_test.cc
Examining data/efl-1.25.1/src/tests/ecore_cxx/ecore_cxx_suite.cc
Examining data/efl-1.25.1/src/tests/ecore_cxx/ecore_cxx_suite.h
Examining data/efl-1.25.1/src/tests/ecore_cxx/ecore_cxx_test_safe_call.cc
Examining data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_suite.c
Examining data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_suite.h
Examining data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_display.c
Examining data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_ecore_wl2.c
Examining data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_input.c
Examining data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_output.c
Examining data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_window.c
Examining data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_tests_helper_egl.h
Examining data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_tests_helpers.h
Examining data/efl-1.25.1/src/tests/ector/cxx_compile_test/cxx_compile_test.cxx
Examining data/efl-1.25.1/src/tests/ector/suite/ector_suite.c
Examining data/efl-1.25.1/src/tests/ector/suite/ector_suite.h
Examining data/efl-1.25.1/src/tests/ector/suite/ector_test_init.c
Examining data/efl-1.25.1/src/tests/edje/edje_suite.c
Examining data/efl-1.25.1/src/tests/edje/edje_suite.h
Examining data/efl-1.25.1/src/tests/edje/edje_test_container.c
Examining data/efl-1.25.1/src/tests/edje/edje_test_edje.c
Examining data/efl-1.25.1/src/tests/edje/edje_test_features.c
Examining data/efl-1.25.1/src/tests/edje/edje_test_signal.c
Examining data/efl-1.25.1/src/tests/edje/edje_test_swallow.c
Examining data/efl-1.25.1/src/tests/edje/edje_test_text.c
Examining data/efl-1.25.1/src/tests/edje/efl_test_layout.c
Examining data/efl-1.25.1/src/tests/edje/efl_test_layout2.c
Examining data/efl-1.25.1/src/tests/edje/efl_test_layout3.c
Examining data/efl-1.25.1/src/tests/edje_cxx/cxx_compile_test.cc
Examining data/efl-1.25.1/src/tests/eet/eet_suite.c
Examining data/efl-1.25.1/src/tests/eet/eet_suite.h
Examining data/efl-1.25.1/src/tests/eet/eet_test_cache.c
Examining data/efl-1.25.1/src/tests/eet/eet_test_cipher.c
Examining data/efl-1.25.1/src/tests/eet/eet_test_common.c
Examining data/efl-1.25.1/src/tests/eet/eet_test_common.h
Examining data/efl-1.25.1/src/tests/eet/eet_test_connection.c
Examining data/efl-1.25.1/src/tests/eet/eet_test_data.c
Examining data/efl-1.25.1/src/tests/eet/eet_test_file.c
Examining data/efl-1.25.1/src/tests/eet/eet_test_identity.c
Examining data/efl-1.25.1/src/tests/eet/eet_test_image.c
Examining data/efl-1.25.1/src/tests/eet/eet_test_init.c
Examining data/efl-1.25.1/src/tests/eet_cxx/eet_cxx_suite.cc
Examining data/efl-1.25.1/src/tests/eet_cxx/eet_cxx_suite.h
Examining data/efl-1.25.1/src/tests/eet_cxx/eet_cxx_test_descriptors.cc
Examining data/efl-1.25.1/src/tests/eeze/eeze_suite.c
Examining data/efl-1.25.1/src/tests/eeze/eeze_suite.h
Examining data/efl-1.25.1/src/tests/eeze/eeze_test_init.c
Examining data/efl-1.25.1/src/tests/eeze/eeze_test_net.c
Examining data/efl-1.25.1/src/tests/eeze/eeze_test_sensor.c
Examining data/efl-1.25.1/src/tests/eeze/eeze_test_udev.c
Examining data/efl-1.25.1/src/tests/efl/efl_suite.c
Examining data/efl-1.25.1/src/tests/efl/efl_suite.h
Examining data/efl-1.25.1/src/tests/efl/efl_test_composite_model.c
Examining data/efl-1.25.1/src/tests/efl/efl_test_container_model.c
Examining data/efl-1.25.1/src/tests/efl_check.h
Examining data/efl-1.25.1/src/tests/efl_js/benchmark_js_suite.cc
Examining data/efl-1.25.1/src/tests/efl_js/benchmark_object_impl.cc
Examining data/efl-1.25.1/src/tests/efl_js/ecore_js_suite.cc
Examining data/efl-1.25.1/src/tests/efl_js/eina_js_containers_suite.cc
Examining data/efl-1.25.1/src/tests/efl_js/eina_js_suite.cc
Examining data/efl-1.25.1/src/tests/efl_js/eio_js_suite.cc
Examining data/efl-1.25.1/src/tests/efl_js/eldbus_js_suite.cc
Examining data/efl-1.25.1/src/tests/efl_js/ethumb_js_suite.cc
Examining data/efl-1.25.1/src/tests/efl_mono/dummy_child.c
Examining data/efl-1.25.1/src/tests/efl_mono/dummy_constructible_object.c
Examining data/efl-1.25.1/src/tests/efl_mono/dummy_event_manager.c
Examining data/efl-1.25.1/src/tests/efl_mono/dummy_hidden_object.c
Examining data/efl-1.25.1/src/tests/efl_mono/dummy_inherit_helper.c
Examining data/efl-1.25.1/src/tests/efl_mono/dummy_interfaces.c
Examining data/efl-1.25.1/src/tests/efl_mono/dummy_numberwrapper.c
Examining data/efl-1.25.1/src/tests/efl_mono/dummy_part_holder.c
Examining data/efl-1.25.1/src/tests/efl_mono/dummy_test_object.c
Examining data/efl-1.25.1/src/tests/efl_mono/eolian_mono_suite.cc
Examining data/efl-1.25.1/src/tests/efl_mono/libefl_mono_native_test.h
Examining data/efl-1.25.1/src/tests/efreet/compare/comp.h
Examining data/efl-1.25.1/src/tests/efreet/compare/efreet_alloc.c
Examining data/efl-1.25.1/src/tests/efreet/compare/efreet_menu_alloc.c
Examining data/efl-1.25.1/src/tests/efreet/ef_cache.c
Examining data/efl-1.25.1/src/tests/efreet/ef_data_dirs.c
Examining data/efl-1.25.1/src/tests/efreet/ef_desktop.c
Examining data/efl-1.25.1/src/tests/efreet/ef_icon_theme.c
Examining data/efl-1.25.1/src/tests/efreet/ef_ini.c
Examining data/efl-1.25.1/src/tests/efreet/ef_locale.c
Examining data/efl-1.25.1/src/tests/efreet/ef_menu.c
Examining data/efl-1.25.1/src/tests/efreet/ef_mime.c
Examining data/efl-1.25.1/src/tests/efreet/ef_test.h
Examining data/efl-1.25.1/src/tests/efreet/ef_utils.c
Examining data/efl-1.25.1/src/tests/efreet/efreet_async_test.c
Examining data/efl-1.25.1/src/tests/efreet/efreet_icon_cache_dump.c
Examining data/efl-1.25.1/src/tests/efreet/efreet_spec_test.c
Examining data/efl-1.25.1/src/tests/efreet/efreet_suite.c
Examining data/efl-1.25.1/src/tests/efreet/efreet_suite.h
Examining data/efl-1.25.1/src/tests/efreet/efreet_test_efreet.c
Examining data/efl-1.25.1/src/tests/efreet/efreet_test_efreet_cache.c
Examining data/efl-1.25.1/src/tests/efreet/efreet_user_dir.c
Examining data/efl-1.25.1/src/tests/efreet/main.c
Examining data/efl-1.25.1/src/tests/eina/cxx_compile_test.cxx
Examining data/efl-1.25.1/src/tests/eina/eina_suite.c
Examining data/efl-1.25.1/src/tests/eina/eina_suite.h
Examining data/efl-1.25.1/src/tests/eina/eina_test_abi.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_abstract_content.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_accessor.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_array.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_barrier.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_benchmark.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_bezier.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_binshare.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_clist.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_convert.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_counter.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_cow.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_crc.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_debug.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_error.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_file.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_fp.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_freeq.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_hash.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_inarray.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_inlist.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_iterator.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_lalloc.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_list.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_lock.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_log.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_magic.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_main.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_matrix.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_matrixsparse.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_mempool.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_module.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_module_dummy.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_quad.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_quadtree.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_quaternion.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_range.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_rbtree.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_rectangle.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_safepointer.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_sched.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_slice.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_slstr.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_str.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_tiler.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_tmpstr.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_trash.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_ustr.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_ustringshare.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_util.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_value.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_vector.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_vpath.c
Examining data/efl-1.25.1/src/tests/eina/eina_test_xattr.c
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_suite.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_suite.h
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_accessor.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_error.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_iterator.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_log.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_optional.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_stringshare.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_thread.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_value.cc
Examining data/efl-1.25.1/src/tests/eina_cxx/simple.c
Examining data/efl-1.25.1/src/tests/eio/efl_io_model_test_file.c
Examining data/efl-1.25.1/src/tests/eio/efl_io_model_test_monitor_add.c
Examining data/efl-1.25.1/src/tests/eio/eio_suite.c
Examining data/efl-1.25.1/src/tests/eio/eio_suite.h
Examining data/efl-1.25.1/src/tests/eio/eio_test_common.c
Examining data/efl-1.25.1/src/tests/eio/eio_test_common.h
Examining data/efl-1.25.1/src/tests/eio/eio_test_eet.c
Examining data/efl-1.25.1/src/tests/eio/eio_test_file.c
Examining data/efl-1.25.1/src/tests/eio/eio_test_manager.c
Examining data/efl-1.25.1/src/tests/eio/eio_test_manager_xattr.c
Examining data/efl-1.25.1/src/tests/eio/eio_test_map.c
Examining data/efl-1.25.1/src/tests/eio/eio_test_monitor.c
Examining data/efl-1.25.1/src/tests/eio/eio_test_sentry.c
Examining data/efl-1.25.1/src/tests/eio/eio_test_xattr.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_fake_server.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_fake_server.h
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_suite.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_suite.h
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_init.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_message.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_model.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_model.h
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_model_connection.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_model_method.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_model_object.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_model_proxy.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_model_signal.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_object.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_pending_cancel.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_pending_data.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_proxy.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_signal_handler.c
Examining data/efl-1.25.1/src/tests/eldbus/eldbus_test_fake_server_eldbus_model_proxy.c
Examining data/efl-1.25.1/src/tests/eldbus_cxx/eldbus_cxx_suite.cc
Examining data/efl-1.25.1/src/tests/eldbus_cxx/eldbus_cxx_suite.h
Examining data/efl-1.25.1/src/tests/eldbus_cxx/eldbus_cxx_test_eldbus_client.cc
Examining data/efl-1.25.1/src/tests/eldbus_cxx/eldbus_cxx_test_eldbus_connect.cc
Examining data/efl-1.25.1/src/tests/elementary/custom_gesture.c
Examining data/efl-1.25.1/src/tests/elementary/custom_gesture.h
Examining data/efl-1.25.1/src/tests/elementary/custom_recognizer.c
Examining data/efl-1.25.1/src/tests/elementary/custom_recognizer2.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_build.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_compile_test.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_model.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_suite.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_suite.h
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_atspi.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_box.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_box_flow.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_box_stack.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_callback.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_check.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_collection.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_collection_common.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_collection_common.h
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_collection_view.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_config.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_focus.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_focus_common.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_focus_common.h
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_focus_sub.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_gesture.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_grid.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_grid_collection.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_group_item.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_image.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_image_zoomable.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_layout.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_list_collection.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_popup.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_position_manager_common.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_progressbar.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_radio_group.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_relative_container.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_scroller.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_select_model.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_slider.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_spin.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_spin_button.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_spotlight.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_table.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_text.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_timepicker.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_vg_animation.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_view_model.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_widget.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_test_win.c
Examining data/efl-1.25.1/src/tests/elementary/efl_ui_window_cnp_dnd_slave.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_file_test_load.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_file_test_memory.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_test_basic.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_test_indent.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_test_line.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_test_parse.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_test_syntax.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_test_text.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_test_widget.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_test_widget_selection.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_test_widget_text.c
Examining data/efl-1.25.1/src/tests/elementary/elm_code_test_widget_undo.c
Examining data/efl-1.25.1/src/tests/elementary/elm_cxx_suite.cc
Examining data/efl-1.25.1/src/tests/elementary/elm_suite.c
Examining data/efl-1.25.1/src/tests/elementary/elm_suite.h
Examining data/efl-1.25.1/src/tests/elementary/elm_suite_build.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_actionslider.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_atspi.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_bg.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_box.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_bubble.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_button.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_calendar.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_check.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_clock.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_colorselector.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_config.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_conformant.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_ctxpopup.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_datetime.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_dayselector.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_diskselector.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_entry.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_fileselector.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_fileselector_button.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_fileselector_entry.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_flip.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_flipselector.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_frame.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_gengrid.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_genlist.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_glview.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_grid.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_hover.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_hoversel.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_icon.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_image.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_index.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_init.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_inwin.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_label.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_layout.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_list.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_map.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_mapbuf.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_menu.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_multibuttonentry.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_naviframe.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_notify.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_panel.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_panes.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_photo.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_photocam.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_player.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_plug.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_popup.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_prefs.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_progressbar.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_radio.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_scroller.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_segmentcontrol.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_separator.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_slider.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_slideshow.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_spinner.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_table.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_thumb.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_toolbar.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_video.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_web.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_widget_basics.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_widget_focus.c
Examining data/efl-1.25.1/src/tests/elementary/elm_test_win.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_basics.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_clickable.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_container.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_content.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_format.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_gfx_arrangement.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_gfx_view.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_multi_selectable.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_pack.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_pack_linear.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_range_display.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_range_interactive.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_selectable.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_single_selectable.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_test_ui_view.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_ui_spec_suite.c
Examining data/efl-1.25.1/src/tests/elementary/spec/efl_ui_spec_suite.h
Examining data/efl-1.25.1/src/tests/elementary/suite_helpers.c
Examining data/efl-1.25.1/src/tests/elementary/suite_helpers.h
Examining data/efl-1.25.1/src/tests/elementary_cxx/cxx_compile_test.cc
Examining data/efl-1.25.1/src/tests/elementary_cxx/cxx_dummy_compile_test.cc
Examining data/efl-1.25.1/src/tests/elput/elput_suite.c
Examining data/efl-1.25.1/src/tests/elput/elput_suite.h
Examining data/efl-1.25.1/src/tests/elput/elput_test_elput.c
Examining data/efl-1.25.1/src/tests/elua/elua_lib.c
Examining data/efl-1.25.1/src/tests/elua/elua_suite.c
Examining data/efl-1.25.1/src/tests/elua/elua_suite.h
Examining data/efl-1.25.1/src/tests/emile/emile_suite.c
Examining data/efl-1.25.1/src/tests/emile/emile_suite.h
Examining data/efl-1.25.1/src/tests/emile/emile_test_base.c
Examining data/efl-1.25.1/src/tests/emile/emile_test_base64.c
Examining data/efl-1.25.1/src/tests/emotion/emotion_test_main-eo.c
Examining data/efl-1.25.1/src/tests/emotion/emotion_test_main.c
Examining data/efl-1.25.1/src/tests/eo/access/access_inherit.c
Examining data/efl-1.25.1/src/tests/eo/access/access_inherit.h
Examining data/efl-1.25.1/src/tests/eo/access/access_main.c
Examining data/efl-1.25.1/src/tests/eo/access/access_simple.c
Examining data/efl-1.25.1/src/tests/eo/access/access_simple.h
Examining data/efl-1.25.1/src/tests/eo/access/access_simple_protected.h
Examining data/efl-1.25.1/src/tests/eo/children/children_main.c
Examining data/efl-1.25.1/src/tests/eo/children/children_simple.c
Examining data/efl-1.25.1/src/tests/eo/children/children_simple.h
Examining data/efl-1.25.1/src/tests/eo/composite_objects/composite_objects_comp.c
Examining data/efl-1.25.1/src/tests/eo/composite_objects/composite_objects_comp.h
Examining data/efl-1.25.1/src/tests/eo/composite_objects/composite_objects_main.c
Examining data/efl-1.25.1/src/tests/eo/composite_objects/composite_objects_simple.c
Examining data/efl-1.25.1/src/tests/eo/composite_objects/composite_objects_simple.h
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_main.c
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_mixin.c
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_mixin.h
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple.c
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple.h
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple2.c
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple2.h
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple3.c
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple3.h
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple4.c
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple4.h
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple5.c
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple5.h
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple6.c
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple6.h
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple7.c
Examining data/efl-1.25.1/src/tests/eo/constructors/constructors_simple7.h
Examining data/efl-1.25.1/src/tests/eo/eunit_tests.h
Examining data/efl-1.25.1/src/tests/eo/function_overrides/function_overrides_inherit.c
Examining data/efl-1.25.1/src/tests/eo/function_overrides/function_overrides_inherit.h
Examining data/efl-1.25.1/src/tests/eo/function_overrides/function_overrides_inherit2.c
Examining data/efl-1.25.1/src/tests/eo/function_overrides/function_overrides_inherit2.h
Examining data/efl-1.25.1/src/tests/eo/function_overrides/function_overrides_inherit3.c
Examining data/efl-1.25.1/src/tests/eo/function_overrides/function_overrides_inherit3.h
Examining data/efl-1.25.1/src/tests/eo/function_overrides/function_overrides_main.c
Examining data/efl-1.25.1/src/tests/eo/function_overrides/function_overrides_simple.c
Examining data/efl-1.25.1/src/tests/eo/function_overrides/function_overrides_simple.h
Examining data/efl-1.25.1/src/tests/eo/interface/interface_interface.c
Examining data/efl-1.25.1/src/tests/eo/interface/interface_interface.h
Examining data/efl-1.25.1/src/tests/eo/interface/interface_interface2.c
Examining data/efl-1.25.1/src/tests/eo/interface/interface_interface2.h
Examining data/efl-1.25.1/src/tests/eo/interface/interface_main.c
Examining data/efl-1.25.1/src/tests/eo/interface/interface_simple.c
Examining data/efl-1.25.1/src/tests/eo/interface/interface_simple.h
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_inherit.c
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_inherit.h
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_main.c
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_mixin.c
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_mixin.h
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_mixin2.c
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_mixin2.h
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_mixin3.c
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_mixin3.h
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_mixin4.c
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_mixin4.h
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_simple.c
Examining data/efl-1.25.1/src/tests/eo/mixin/mixin_simple.h
Examining data/efl-1.25.1/src/tests/eo/signals/signals_main.c
Examining data/efl-1.25.1/src/tests/eo/signals/signals_simple.c
Examining data/efl-1.25.1/src/tests/eo/signals/signals_simple.h
Examining data/efl-1.25.1/src/tests/eo/suite/eo_error_msgs.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_error_msgs.h
Examining data/efl-1.25.1/src/tests/eo/suite/eo_suite.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_suite.h
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_call_errors.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_class_behaviour_errors.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_class_errors.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_class_simple.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_class_simple.h
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_class_singleton.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_class_singleton.h
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_domain.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_domain.h
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_event.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_general.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_init.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_lifecycle.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_reflection.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_reflection_complex_class_structure.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_reflection_complex_class_structure.h
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_threaded_calls.c
Examining data/efl-1.25.1/src/tests/eo/suite/eo_test_value.c
Examining data/efl-1.25.1/src/tests/eo_cxx/eo_cxx_suite.cc
Examining data/efl-1.25.1/src/tests/eo_cxx/eo_cxx_suite.h
Examining data/efl-1.25.1/src/tests/eolian/data/class_simple_ref.c
Examining data/efl-1.25.1/src/tests/eolian/data/class_simple_ref_eo.h
Examining data/efl-1.25.1/src/tests/eolian/data/docs_ref.h
Examining data/efl-1.25.1/src/tests/eolian/data/function_as_argument_impl_ref.c
Examining data/efl-1.25.1/src/tests/eolian/data/function_as_argument_ref.c
Examining data/efl-1.25.1/src/tests/eolian/data/function_as_argument_ref.h
Examining data/efl-1.25.1/src/tests/eolian/data/function_types_ref.h
Examining data/efl-1.25.1/src/tests/eolian/data/import_types_ref.h
Examining data/efl-1.25.1/src/tests/eolian/data/object_impl_add_ref.c
Examining data/efl-1.25.1/src/tests/eolian/data/object_impl_ref.c
Examining data/efl-1.25.1/src/tests/eolian/data/override_ref.c
Examining data/efl-1.25.1/src/tests/eolian/data/owning_ref.c
Examining data/efl-1.25.1/src/tests/eolian/data/struct_ref.h
Examining data/efl-1.25.1/src/tests/eolian/data/struct_ref_stub.h
Examining data/efl-1.25.1/src/tests/eolian/data/typedef_ref.h
Examining data/efl-1.25.1/src/tests/eolian/data/typedef_ref_stub.h
Examining data/efl-1.25.1/src/tests/eolian/eolian_aux.c
Examining data/efl-1.25.1/src/tests/eolian/eolian_generated_future.c
Examining data/efl-1.25.1/src/tests/eolian/eolian_generation.c
Examining data/efl-1.25.1/src/tests/eolian/eolian_parsing.c
Examining data/efl-1.25.1/src/tests/eolian/eolian_static.c
Examining data/efl-1.25.1/src/tests/eolian/eolian_suite.c
Examining data/efl-1.25.1/src/tests/eolian/eolian_suite.h
Examining data/efl-1.25.1/src/tests/eolian_cxx/a.c
Examining data/efl-1.25.1/src/tests/eolian_cxx/b.c
Examining data/efl-1.25.1/src/tests/eolian_cxx/c.c
Examining data/efl-1.25.1/src/tests/eolian_cxx/complex.c
Examining data/efl-1.25.1/src/tests/eolian_cxx/complex_cxx.cc
Examining data/efl-1.25.1/src/tests/eolian_cxx/eolian_cxx_suite.cc
Examining data/efl-1.25.1/src/tests/eolian_cxx/eolian_cxx_suite.h
Examining data/efl-1.25.1/src/tests/eolian_cxx/eolian_cxx_test_address_of.cc
Examining data/efl-1.25.1/src/tests/eolian_cxx/eolian_cxx_test_binding.cc
Examining data/efl-1.25.1/src/tests/eolian_cxx/eolian_cxx_test_cyclic.cc
Examining data/efl-1.25.1/src/tests/eolian_cxx/eolian_cxx_test_documentation.cc
Examining data/efl-1.25.1/src/tests/eolian_cxx/eolian_cxx_test_generate.cc
Examining data/efl-1.25.1/src/tests/eolian_cxx/eolian_cxx_test_inheritance.cc
Examining data/efl-1.25.1/src/tests/eolian_cxx/eolian_cxx_test_parse.cc
Examining data/efl-1.25.1/src/tests/eolian_cxx/eolian_cxx_test_wrapper.cc
Examining data/efl-1.25.1/src/tests/eolian_cxx/generic.c
Examining data/efl-1.25.1/src/tests/eolian_cxx/name1_name2_type_generation.c
Examining data/efl-1.25.1/src/tests/eolian_cxx/name_name.c
Examining data/efl-1.25.1/src/tests/eolian_cxx/name_name_cxx.cc
Examining data/efl-1.25.1/src/tests/eolian_cxx/simple.c
Examining data/efl-1.25.1/src/tests/eolian_js/eolian_js_suite.cc
Examining data/efl-1.25.1/src/tests/eolian_js/eolian_js_test_constructor_method_impl.c
Examining data/efl-1.25.1/src/tests/eolian_js/eolian_js_test_eolian_js_binding.cc
Examining data/efl-1.25.1/src/tests/eolian_js/eolian_js_test_evas_box.cc
Examining data/efl-1.25.1/src/tests/eolian_js/eolian_js_test_test_object_impl.c
Examining data/efl-1.25.1/src/tests/evas/efl_canvas_animation.c
Examining data/efl-1.25.1/src/tests/evas/efl_test_canvas.c
Examining data/efl-1.25.1/src/tests/evas/efl_test_canvas2.c
Examining data/efl-1.25.1/src/tests/evas/efl_test_canvas3.c
Examining data/efl-1.25.1/src/tests/evas/evas_buffer_helper.c
Examining data/efl-1.25.1/src/tests/evas/evas_buffer_helper.h
Examining data/efl-1.25.1/src/tests/evas/evas_suite.c
Examining data/efl-1.25.1/src/tests/evas/evas_suite.h
Examining data/efl-1.25.1/src/tests/evas/evas_test_callbacks.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_evasgl.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_events.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_filters.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_focus.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_image.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_init.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_mask.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_new.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_object.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_object_smart.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_render_engines.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_text.c
Examining data/efl-1.25.1/src/tests/evas/evas_test_textblock.c
Examining data/efl-1.25.1/src/tests/evas/evas_tests_helpers.h
Examining data/efl-1.25.1/src/tests/evas_cxx/cxx_compile_test.cc
Examining data/efl-1.25.1/src/tests/evil/evil_suite.c
Examining data/efl-1.25.1/src/tests/evil/evil_suite.h
Examining data/efl-1.25.1/src/tests/evil/evil_test_dlfcn.c
Examining data/efl-1.25.1/src/tests/evil/evil_test_main.c
Examining data/efl-1.25.1/src/tests/evil/evil_test_stdio.c
Examining data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c
Examining data/efl-1.25.1/src/tests/evil/evil_test_unistd.c
Examining data/efl-1.25.1/src/tests/timeout.c

FINAL RESULTS:

data/efl-1.25.1/src/bin/edje/edje_decc.c:466:21:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
                if (chmod(out,
data/efl-1.25.1/src/bin/elementary/run.c:129:33:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
                  ssize_t len = readlink(exe, buf2, sizeof(buf2) - 1);
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:491:23:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
                  if (chmod(tmpstr, mode) == -1)
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:723:17:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
   if ((count = readlink(link, buf, sizeof(buf) - 1)) < 0) return NULL;
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:642:16:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        size = readlink(file, link, sizeof(link));
data/efl-1.25.1/src/lib/eio/eio_dir.c:303:20:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
          length = readlink(ln, target, bsz);
data/efl-1.25.1/src/lib/eio/eio_dir.c:377:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
        if (chmod(eina_strbuf_string_get(target), buffer.st_mode) != 0)
data/efl-1.25.1/src/lib/eio/eio_single.c:203:8:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
   if (chmod(ch->path, ch->mode) != 0)
data/efl-1.25.1/src/lib/eio/eio_single.c:255:8:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
   if (chown(own->path, owner, group) != 0)
data/efl-1.25.1/src/lib/elementary/elm_code_file.c:219:12:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
        if(chmod(path, mode) < 0)
data/efl-1.25.1/src/tests/eina/eina_test_file.c:791:8:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
   if (readlink(fmt, buf, sizeof(buf)))
data/efl-1.25.1/src/tests/eio/eio_test_monitor.c:108:14:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
   int ret = chmod((const char*)data, 0666);
data/efl-1.25.1/src/tests/eio/eio_test_sentry.c:102:14:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
   int ret = chmod((const char*)data, 0666);
data/efl-1.25.1/src/benchmarks/eina/evas_hash.c:134:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)el->key, key);
data/efl-1.25.1/src/benchmarks/eina/evas_stringshare.c:224:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(el_str, str);
data/efl-1.25.1/src/benchmarks/evas/evas_bench_loader.c:14:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(filename, PATH_MAX, TESTS_SRC_DIR"/images/%s", name);
data/efl-1.25.1/src/benchmarks/evas/evas_bench_saver.c:17:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(filename, PATH_MAX, TESTS_SRC_DIR"/images/%s", name);
data/efl-1.25.1/src/bin/edje/edje_cc.c:95:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, fmt, args);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:4367:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   ep->access = ep2->access;
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:10937:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
             strcat(str, s);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2346:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(embryo_cc_path, sizeof(embryo_cc_path),
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2358:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(embryo_cc_path, sizeof(embryo_cc_path),
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2642:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(s, lw->file);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2643:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(s, "edje/license/%s", basename(s));
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:4115:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(key, prefix);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:413:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(file_buf, fl);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1064:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                  strcat(def, define);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1077:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
             snprintf(buf2, sizeof(buf2),
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1086:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          snprintf(buf2, sizeof(buf2),
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1095:16:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
               snprintf(buf, sizeof(buf), "\"%s\" "SKIP_NAMESPACE_VALIDATION_SUPPORTED" -MMD \"%s\" -MT \"%s\" \"%s\""
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1103:16:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
               snprintf(buf, sizeof(buf), "\"%s\" "SKIP_NAMESPACE_VALIDATION_SUPPORTED" -annotate -a \"%s\" \"%s\""
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1111:16:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
               snprintf(buf, sizeof(buf), "\"%s\" "SKIP_NAMESPACE_VALIDATION_SUPPORTED" -a \"%s\" \"%s\" -I\"%s\" %s"
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1129:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
             ret = system(win_buf);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1131:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
             ret = system(buf);
data/efl-1.25.1/src/bin/edje/edje_codegen.c:427:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_HEADER, str, str);
data/efl-1.25.1/src/bin/edje/edje_codegen.c:436:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), C_HEADER, ecore_file_file_get(filename));
data/efl-1.25.1/src/bin/edje/edje_codegen.c:450:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_FOOTER, str);
data/efl-1.25.1/src/bin/edje/edje_codegen.c:467:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_CODEGEN_OBJECT_ADD, prefix);
data/efl-1.25.1/src/bin/edje/edje_codegen.c:471:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), C_CODEGEN_OBJECT_ADD, prefix, group, file, group);
data/efl-1.25.1/src/bin/edje/edje_codegen.c:487:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
       snprintf(buf, sizeof(buf), template, prefix, apiname, \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:492:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
       snprintf(buf, sizeof(buf), template, prefix,          \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:511:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), C_CODEGEN_DRAG_DIR_GET, prefix,
data/efl-1.25.1/src/bin/edje/edje_codegen.c:515:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_CODEGEN_DRAG_DIR_GET, prefix, apiname);
data/efl-1.25.1/src/bin/edje/edje_codegen.c:532:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
       snprintf(buf, sizeof(buf), template, info->apiname, info->name,        \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:537:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
       snprintf(buf, sizeof(buf), template, info->apiname, info->name,        \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:543:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
       snprintf(buf, sizeof(buf), template, info->apiname, info->name,        \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:548:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
       snprintf(buf, sizeof(buf), template, info->apiname, info->name,        \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:671:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
       snprintf(buf, sizeof(buf), C_CODEGEN_##sufix, prefix, \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:675:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
       snprintf(buf, sizeof(buf), H_CODEGEN_##sufix, prefix, \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:867:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), C_CODEGEN_PROGRAM_EMIT, prefix,
data/efl-1.25.1/src/bin/edje/edje_codegen.c:879:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_CODEGEN_PROGRAM_EMIT, prefix,
data/efl-1.25.1/src/bin/edje/edje_codegen.c:897:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), C_CODEGEN_PROGRAM_CALLBACK_ADD, prefix,
data/efl-1.25.1/src/bin/edje/edje_codegen.c:902:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), C_CODEGEN_PROGRAM_CALLBACK_DEL, prefix,
data/efl-1.25.1/src/bin/edje/edje_codegen.c:914:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_CODEGEN_PROGRAM_CALLBACK_ADD, prefix,
data/efl-1.25.1/src/bin/edje/edje_codegen.c:919:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_CODEGEN_PROGRAM_CALLBACK_DEL, prefix,
data/efl-1.25.1/src/bin/edje/edje_codegen.c:1150:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (access(file, R_OK) == -1)
data/efl-1.25.1/src/bin/edje/edje_convert.c:253:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(buffer, "%s/%s", ce->entry, #Tp);             \
data/efl-1.25.1/src/bin/edje/edje_convert_main.c:63:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        if (sscanf(match[i], buf, &id) != 1)
data/efl-1.25.1/src/bin/edje/edje_convert_main.c:93:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        if (sscanf(match[i], buf, &id) != 1)
data/efl-1.25.1/src/bin/edje/edje_decc.c:120:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, fmt, args);
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:397:14:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        else printf(INDENT2 "type {\n" INDENT3 "name: \"%s\";\n", name);
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:407:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               printf(INDENT3 "label: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:413:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               printf(INDENT3 "description: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:426:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             else printf(INDENT4 "%s: \"%s\"", pt, param->name);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:134:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT "min: %d %d;\n", w, h);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:140:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT "max: %d %d;\n", w, h);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:157:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  else printf(INDENT2 "item: \"%s\" \"%s\";\n", k, v);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:246:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(INDENT3 "description { state: \"%s\" %2.1f;", state, value);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:306:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT4 "color: %d %d %d %d;\n", r, g, b, a);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:315:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT4 "color2: %d %d %d %d;\n", r, g, b, a);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:322:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT4 "color3: %d %d %d %d;\n", r, g, b, a);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:329:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT4 "align: %g %g;\n", dx, dy);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:335:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT4 "min: %d %d;\n", x, y);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:341:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT4 "max: %d %d;\n", x, y);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:352:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT4 "aspect: %g %g;\n", dx, dy);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:358:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT4 "aspect_preference: %s;\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:364:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT4 "color_class: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:381:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "relative: %g %g;\n", dx, dy);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:385:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "offset: %d %d;\n", x, y);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:390:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "to: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:393:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             if (str) printf(INDENT5 "to_x: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:394:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             if (str2) printf(INDENT5 "to_y: \"%s\";\n", str2);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:417:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "relative: %g %g;\n", dx, dy);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:421:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "offset: %d %d;\n", x, y);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:426:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "to: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:429:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             if (str) printf(INDENT5 "to_x: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:430:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             if (str2) printf(INDENT5 "to_y: \"%s\";\n", str2);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:447:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             if (str) printf(INDENT5 "normal: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:450:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT4 "image.normal: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:465:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  else printf(INDENT5 "tween: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:475:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               printf(INDENT5 "border: %d %d %d %d;\n", bl, br, bt, bb);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:481:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               printf(INDENT5 "middle: %s;\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:521:26:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                         printf(INDENT6 "origin {\n"
data/efl-1.25.1/src/bin/edje/edje_inspector.c:537:26:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                         printf(INDENT6 "size {\n"
data/efl-1.25.1/src/bin/edje/edje_inspector.c:599:21:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    printf(INDENT6 "origin {\n"
data/efl-1.25.1/src/bin/edje/edje_inspector.c:615:21:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    printf(INDENT6 "size {\n"
data/efl-1.25.1/src/bin/edje/edje_inspector.c:637:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "text: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:643:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "font: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:649:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "size: %d;\n", x);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:657:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "align: %g %g;\n", dx, dy);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:663:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "fit: %d %d;\n", x, y);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:668:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(INDENT5 "ellipsis: %g;\n", dx);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:690:21:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    printf(INDENT5 "int: \"%s\" \"%d\";\n", p->name, p->i);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:694:21:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    printf(INDENT5 "double: \"%s\" \"%g\";\n", p->name, p->d);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:699:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                      printf(INDENT5 "string: \"%s\" \"%s\";\n",
data/efl-1.25.1/src/bin/edje/edje_inspector.c:704:21:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    printf(INDENT5 "bool: \"%s\" \"%d\";\n", p->name, p->i);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:709:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                      printf(INDENT5 "choice: \"%s\" \"%s\";\n",
data/efl-1.25.1/src/bin/edje/edje_inspector.c:739:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(INDENT2 "part { name: '%s'; type: %s;", name, type);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:850:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT3 "api: \"%s\" \"%s\";\n", str ? str : "", str2 ? str2 : "");
data/efl-1.25.1/src/bin/edje/edje_inspector.c:875:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT3 "clip_to: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:881:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT3 "source: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:891:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               printf(INDENT3 "effect: %s;\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:907:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             else printf(INDENT4 "x: %d %d %d;\n", dir, step, count);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:913:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             else printf(INDENT4 "y: %d %d %d;\n", dir, step, count);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:918:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               printf(INDENT4 "confine: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:924:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               printf(INDENT4 "events: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1031:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             else printf(INDENT "part: %s\n", pname);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1100:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(INDENT2 "program { name: '%s';\n", name ? name : "");
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1159:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT3 "api: \"%s\" \"%s\";\n", str ? str : "", str2 ? str2 : "");
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1166:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT3 "signal: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1172:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     printf(INDENT3 "source: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1192:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               printf(INDENT3 "action: STATE_SET \"%s\" %2.1f;\n",
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1205:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               printf(INDENT3 "action: SIGNAL_EMIT \"%s\" \"%s\";\n",
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1238:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  else printf(INDENT3 "transition: %s %g;\n", str, from);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1248:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  else printf(INDENT3 "in: %g %g;\n", from, range);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1255:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          else printf(INDENT3 "target: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1261:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          else printf(INDENT3 "after: \"%s\";\n", str);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1425:14:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        else printf(INDENT "item: \"%s\" \"%s\";\n", key, value);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1497:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             else printf(INDENT "image: \"%s\" %s;\n", img, comp);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1502:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             else printf(INDENT "image: \"%s\" %s;\n", img, comp);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1510:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               printf(INDENT "image: \"%s\" %s; /* id: \"edje/images/%d\" */\n",
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1544:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             else printf(INDENT "font: \"%s\" \"%s\";\n", path, alias);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1549:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             else printf(INDENT "font: \"%s\" \"%s\";\n", path, alias);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1557:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               printf(INDENT
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1590:14:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        else printf(INDENT "external: \"%s\";\n", key);
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1673:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (access(file, R_OK) == -1)
data/efl-1.25.1/src/bin/edje/edje_multisense_convert.c:113:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(tmp, snd_path);
data/efl-1.25.1/src/bin/edje/edje_multisense_convert.c:224:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(tmp, snd_path);
data/efl-1.25.1/src/bin/edje/edje_player.c:1064:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (access(argv[args], R_OK) == -1)
data/efl-1.25.1/src/bin/edje/edje_watch.c:79:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   ret = system(edje_cc_command);
data/efl-1.25.1/src/bin/edje/epp/cpperror.c:101:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(stderr, msg, args);
data/efl-1.25.1/src/bin/edje/epp/cpperror.c:121:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(stderr, msg, args);
data/efl-1.25.1/src/bin/edje/epp/cppexp.c:470:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		  sprintf(buf, "`%s' not allowed in operand of `#if'",
data/efl-1.25.1/src/bin/edje/epp/cppexp.c:1039:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		  fprintf(stderr,
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:618:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy((char *)buf, (const char *)str);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:661:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)buf, (const char *)str);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2357:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(bufx, "\"%s\"", version_string);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2409:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(bufx, "\"%s %2d %4d\"", monthnames[timebuf->tm_mon],
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2498:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(directive, " __BASE_FILE__ \"%s\"\n", pbuffer->nominal_fname);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2503:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(directive, " __VERSION__ \"%s\"\n", version_string);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2509:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(directive, " __SIZE_TYPE__ %s\n", SIZE_TYPE);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2516:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(directive, " __PTRDIFF_TYPE__ %s\n", PTRDIFF_TYPE);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2522:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(directive, " __WCHAR_TYPE__ %s\n", CPP_WCHAR_TYPE(pfile));
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2527:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(directive, " __DATE__ \"%s %2d %4d\"\n",
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3362:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(fname, searchptr->fname);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3447:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			    strcpy(p, searchptr->fname);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3449:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			    strcat(p, fname);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5331:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(i->name, fname);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5414:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(name, dirname);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5417:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(name, FILE_NAME_MAP_FILE);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5452:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(ptr->map_to, dirname);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5454:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(ptr->map_to + dirlen + 1, to);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5746:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(p, predefs);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5961:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			  strcpy(str, specd_prefix);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5962:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			  strcat(str, di->fname + default_len);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6129:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	     strcpy(p, q);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6306:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		       strcpy(dirtmp->fname, argv[++i]);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6347:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		       strcpy(dirtmp->fname, prefix);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6348:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		       strcat(dirtmp->fname, argv[++i]);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6390:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		       strcpy(dirtmp->fname, prefix);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6391:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		       strcat(dirtmp->fname, argv[++i]);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:7204:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(output, input);
data/efl-1.25.1/src/bin/eet/eet_main.c:120:14:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             printf(rw ? "%s of size %i is compressed.\n" : "%s of size %i is not compressed.\n", list[i], tsize);
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:121:8:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   p = popen(buf, "r");
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:176:8:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   p = popen(buf, "r");
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:294:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
   if (sscanf(btline, "%s %llx %llx", bin, &offset, &base) == 3)
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:335:14:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
         p = popen(d->test, "r");
data/efl-1.25.1/src/bin/eldbus/codegen.h:85:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   char access;
data/efl-1.25.1/src/bin/eldbus/source_client.c:23:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer, "%s_%s", code_prefix, text);
data/efl-1.25.1/src/bin/eldbus/source_client.c:528:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if ((prop->access & ACCESS_READ) == ACCESS_READ)
data/efl-1.25.1/src/bin/eldbus/source_client.c:530:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if ((prop->access & ACCESS_WRITE) == ACCESS_WRITE)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:339:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_HEADER, str, str);
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:348:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), C_HEADER, ecore_file_file_get(filename));
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:362:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_FOOTER, str);
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:400:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), C_CODEGEN_LAYOUT_ADD, prefix, file, str[0],
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:405:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_CODEGEN_LAYOUT_ADD, prefix);
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:424:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
     snprintf(buf, sizeof(buf), C_CODEGEN_PART_##sufix, prefix,   \
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:428:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
     snprintf(buf, sizeof(buf), H_CODEGEN_PART_##sufix, prefix,   \
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:573:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), C_CODEGEN_PROGRAM_EMIT, prefix,
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:585:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_CODEGEN_PROGRAM_EMIT, prefix,
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:603:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), C_CODEGEN_PROGRAM_CALLBACK_ADD, prefix,
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:608:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), C_CODEGEN_PROGRAM_CALLBACK_DEL, prefix,
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:620:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_CODEGEN_PROGRAM_CALLBACK_ADD, prefix,
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:625:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), H_CODEGEN_PROGRAM_CALLBACK_DEL, prefix,
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:806:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (access(file, R_OK) == -1)
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc.c:62:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, fmt, args);
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:290:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(file_buf, fl);
data/efl-1.25.1/src/bin/elementary/run.c:102:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                            strcpy(buf + len + 1, argv[0]);
data/efl-1.25.1/src/bin/elementary/run.c:103:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            if (!access(buf, R_OK | X_OK))
data/efl-1.25.1/src/bin/elementary/run.c:198:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy((char *)pos, sargv[i]);
data/efl-1.25.1/src/bin/elementary/run.c:208:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy((char *)pos, environ[i]);
data/efl-1.25.1/src/bin/elementary/run.c:217:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)pos, cwd);
data/efl-1.25.1/src/bin/elementary/test_config.c:90:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
             strcat(buf, profiles[i]);
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:46:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(new_path, "%s", path);
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:69:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(new_path, "%s", path);
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:112:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(new_path, "%s", path);
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:185:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(item_text, elm_object_item_text_get(list_it));
data/efl-1.25.1/src/bin/elementary/test_events.c:58:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(str, "key=%s keyname=%s string=%s compose=%s",
data/efl-1.25.1/src/bin/elementary/test_events.c:111:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf, "Button was clicked %d time%s", td->id, td->id > 1 ? "s" : "");
data/efl-1.25.1/src/bin/elementary/test_focus_style.c:30:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(win_focus_theme, "%s/objects/test_focus_style.edj", elm_app_data_dir_get());
data/efl-1.25.1/src/bin/elementary/test_focus_style.c:125:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(win_focus_theme, "%s/objects/test_focus_style.edj", elm_app_data_dir_get());
data/efl-1.25.1/src/bin/elementary/test_genlist.c:5234:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf, "%s", elm_object_text_get(obj));
data/efl-1.25.1/src/bin/elementary/test_label.c:467:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(status + strlen(status),"%s",styles_names[app->i_style]);
data/efl-1.25.1/src/bin/elementary/test_list.c:722:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(str, "%s is selected", elm_object_item_text_get(lit));
data/efl-1.25.1/src/bin/elementary/test_list.c:1045:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(str, "%s is selected", elm_object_item_text_get(lit));
data/efl-1.25.1/src/bin/elementary/test_list.c:1065:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(str, "%s is selected", elm_object_item_text_get(lit));
data/efl-1.25.1/src/bin/elementary/test_list.c:1085:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(str, "%s is selected", elm_object_item_text_get(lit));
data/efl-1.25.1/src/bin/elementary/test_list.c:1102:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(str, "%s is selected", elm_object_item_text_get(lit));
data/efl-1.25.1/src/bin/elementary/test_ui_table.c:530:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf, "%s %d", str ?: "item", ++id);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:142:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(stderr, message, argptr);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:607:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	 strcpy(oname, argv[i]); /* FIXME */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:623:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	 strcpy(iname, argv[i]); /* FIXME */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:641:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(pname, sDEF_PREFIX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:988:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(name, symname);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1916:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(sym->name, tmpname);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1977:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(symname, "%s%s%s", tag2str(tagstr1, resulttag), opername,
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1980:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(symname, "%s%s", opername, tag2str(tagstr1, tag1));
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1982:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(symname, "%s%s%s", tag2str(tagstr1, tag1), opername,
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2029:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	   strcpy(dest, funcname);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2038:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(dest, "operator%s(%s:)", opname, tagsym[1]->name);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2046:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(dest, "%s:operator%s(%s:)", tagsym[0]->name, opname,
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2049:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(dest, "operator%s(%s:,%s:)", opname, tagsym[0]->name,
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2097:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(symbolname, str);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2195:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(symbolname, firstname);	/* save symbol name */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2220:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	     strcpy(symbolname, str);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:97:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	     strcpy(ext, extensions[ext_idx]);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:1721:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(lastsymbol, st);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:698:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		     strcpy(alias, sym->name);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:703:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(alias, sym->name);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:716:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(alias, sym->name);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:879:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(alias, sym->name);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:177:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(stgbuf, st);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:400:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	   strcpy(sequences[i].find, str);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:408:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	   strcpy(sequences[i].replace, str);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:482:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(symbols[var], str);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:573:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	     strcpy(sptr, symbols[var]);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sclist.c:159:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(target, cur->second);
data/efl-1.25.1/src/bin/exactness/exactness.c:115:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(filename1, "%s/%s", orig_dir, ent_name);
data/efl-1.25.1/src/bin/exactness/exactness.c:116:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(filename2, "%s/%s/%s", _dest_dir, CURRENT_SUBDIR, ent_name);
data/efl-1.25.1/src/bin/exactness/exactness.c:124:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buf, "%s/%s/comp_%s", _dest_dir, CURRENT_SUBDIR, ent_name);
data/efl-1.25.1/src/bin/exactness/exactness.c:175:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(path, "%s/%s.exu", base_dir, ent->name);
data/efl-1.25.1/src/bin/exactness/exactness.c:179:14:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
             sprintf(origdir, "%s/%s/%s", _dest_dir, CURRENT_SUBDIR, ORIG_SUBDIR);
data/efl-1.25.1/src/bin/exactness/exactness.c:189:14:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
             sprintf(path, "%s/%s/%s.exu", _dest_dir, CURRENT_SUBDIR, ent->name);
data/efl-1.25.1/src/bin/exactness/exactness.c:191:14:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
             sprintf(currentdir, "%s/%s", _dest_dir, CURRENT_SUBDIR);
data/efl-1.25.1/src/bin/exactness/exactness.c:199:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(path, "%s/%s%c%.3d.png", origdir, ent->name, SHOT_DELIMITER, n);
data/efl-1.25.1/src/bin/exactness/exactness.c:202:14:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
             sprintf(path, "%s%c%.3d.png", ent->name, SHOT_DELIMITER, n);
data/efl-1.25.1/src/bin/exactness/exactness.c:227:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(scn_path, "%s/%s.exu", base_dir, ent->name);
data/efl-1.25.1/src/bin/exactness/inspect.c:133:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
              sprintf(output, "Keyname %s Key %s String %s Compose %s Keycode %d",
data/efl-1.25.1/src/bin/exactness/inspect.c:140:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
              sprintf(output, "Widget %s Event %s", t->wdg_name, t->event_name);
data/efl-1.25.1/src/bin/exactness/inspect.c:146:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
              sprintf(output, "Widget %s", t->wdg_name);
data/efl-1.25.1/src/bin/exactness/inspect.c:329:20:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                   snprintf(buf2, sizeof(buf2), "Fonts directory comparison: "LDIFF(%s)"/"RDIFF(%s),
data/efl-1.25.1/src/bin/exactness/inspect.c:339:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf, "%s%s", str, compare ? " comparison" : "");
data/efl-1.25.1/src/bin/exactness/player.c:202:14:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
             sprintf(filename, "%s/%s%c%03d%s", _dest, _test_name,
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:339:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:341:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:373:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:376:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:378:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:380:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:382:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:384:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:386:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:401:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:403:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:405:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:407:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:409:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:411:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:413:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:415:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:417:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:419:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:421:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:423:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:426:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:428:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:430:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:432:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:434:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:436:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:438:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:440:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:442:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:444:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:446:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:448:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:450:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:452:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:454:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:456:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:458:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:460:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:462:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:464:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:466:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/bindings/js/efl_js/efl_js.cc:470:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, __FILE__ ":%d\n", __LINE__); fflush(stderr);
data/efl-1.25.1/src/examples/ecore/ecore_con_client_simple_example.c:71:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(fmt, ev->data);
data/efl-1.25.1/src/examples/ecore/ecore_con_server_http_example.c:42:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), response_template, sizeof(welcome) - 1, ctime(&t), welcome);
data/efl-1.25.1/src/examples/ecore/ecore_con_server_http_example.c:88:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(fmt, ev->data);
data/efl-1.25.1/src/examples/ecore/ecore_con_server_simple_example.c:83:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(fmt, ev->data);
data/efl-1.25.1/src/examples/ecore/ecore_evas_basics_example.c:66:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(data, "%s", "hello");
data/efl-1.25.1/src/examples/ecore/ecore_evas_window_sizes_example.c:73:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/ecore/ecore_evas_window_sizes_example.c:198:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(commands);
data/efl-1.25.1/src/examples/ecore/ecore_fd_handler_gnutls_example.c:35:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(stderr, __VA_ARGS__); \
data/efl-1.25.1/src/examples/edje/edje-animations.c:78:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-animations.c:145:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-animations.c:194:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(commands);
data/efl-1.25.1/src/examples/edje/edje-basic.c:54:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-basic.c:94:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-basic.c:220:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(commands);
data/efl-1.25.1/src/examples/edje/edje-box.c:116:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-box.c:154:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-box.c:219:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(commands);
data/efl-1.25.1/src/examples/edje/edje-box2.c:90:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-box2.c:214:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(commands);
data/efl-1.25.1/src/examples/edje/edje-drag.c:78:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-drag.c:106:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-drag.c:174:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(commands);
data/efl-1.25.1/src/examples/edje/edje-edit-part-box.c:85:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-edit-part-box.c:361:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(commands);
data/efl-1.25.1/src/examples/edje/edje-perspective.c:103:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-perspective.c:153:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-perspective.c:220:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(commands);
data/efl-1.25.1/src/examples/edje/edje-signals-messages.c:56:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-signals-messages.c:78:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/edje-signals-messages.c:218:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(commands);
data/efl-1.25.1/src/examples/edje/edje-text.c:91:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(s + 9, lang[lang_idx]);
data/efl-1.25.1/src/examples/edje/sigtest.c:50:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/sigtest.c:105:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/edje/sigtest.c:308:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(commands);
data/efl-1.25.1/src/examples/eina/eina_log_03.c:46:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(output, fmt, args);
data/efl-1.25.1/src/examples/eina/eina_str_01.c:60:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(str, "%s", "cylons+");
data/efl-1.25.1/src/examples/eina/eina_tmpstr_01.c:26:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(str2, prologe);
data/efl-1.25.1/src/examples/elementary/filemvc.c:111:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(priv.imagedefault_path, "%s/images/logo.png", elm_app_data_dir_get());
data/efl-1.25.1/src/examples/elementary/win_example.c:219:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf, "%s/images/logo.png", elm_app_data_dir_get());
data/efl-1.25.1/src/examples/ephysics/ephysics_logo.c:112:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), PACKAGE_DATA_DIR "/logo_shadow-%s.png", letter);
data/efl-1.25.1/src/examples/ephysics/ephysics_logo.c:121:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), PACKAGE_DATA_DIR "/logo_letter-%s.png", letter);
data/efl-1.25.1/src/examples/ephysics/ephysics_logo.c:129:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), PACKAGE_DATA_DIR "/logo_light-%s.png", letter);
data/efl-1.25.1/src/examples/evas/evas-hints.c:168:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(commands);
data/efl-1.25.1/src/examples/evas/evas-hints.c:372:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(commands);
data/efl-1.25.1/src/generic/evas/gst/main.c:20:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define D(fmt, args...) fprintf(stderr, fmt, ## args)
data/efl-1.25.1/src/generic/evas/pdf/main.cpp:27:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define D(fmt, args...) fprintf(stderr, fmt, ## args)
data/efl-1.25.1/src/generic/evas/pdf/main.cpp:258:20:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
             cmd = popen(eina_strbuf_string_get(tmp), "r");
data/efl-1.25.1/src/generic/evas/ps/main.c:19:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define D(fmt, args...) fprintf(stderr, fmt, ## args)
data/efl-1.25.1/src/generic/evas/raw/main.c:35:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define D(fmt, args...) fprintf(stderr, fmt, ## args)
data/efl-1.25.1/src/generic/evas/xcf/common.h:47:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define D(fmt, args...) fprintf(stderr, fmt, ## args)
data/efl-1.25.1/src/lib/ecore/ecore_app.c:50:4:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   execvp(app_argv[0], args);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:1036:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(buf, exe_cmd);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:1062:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(buf, exe_cmd);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:1095:7:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execl("/bin/sh", "/bin/sh", "-c", exe_cmd, (char *)NULL);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:1109:7:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execl(shell, shell, "-c", exe_cmd, (char *)NULL);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:1119:20:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      if (args[0]) execvp(args[0], args);
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:1040:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(stderr, fmt, ap);
data/efl-1.25.1/src/lib/ecore/ecore_internal.h:105:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(buf, sizeof (buf), Base"-%p", Parent);                       \
data/efl-1.25.1/src/lib/ecore/efl_core_command_line.c:254:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(param, content);
data/efl-1.25.1/src/lib/ecore/efl_exe.c:117:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(buf, cmd);
data/efl-1.25.1/src/lib/ecore/efl_exe.c:139:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(buf, cmd);
data/efl-1.25.1/src/lib/ecore/efl_exe.c:168:9:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execl("/bin/sh", "/bin/sh", "-c", cmd, NULL);
data/efl-1.25.1/src/lib/ecore/efl_exe.c:178:22:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        if (args[0]) execvp(args[0], args);
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out_pulse.c:350:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(dispenv, disp);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:193:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        int r = snprintf(buf, buflen, "unnamed:" SOCKET_FMT, fd);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_proxy_helper.c:90:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
     snprintf
data/efl-1.25.1/src/lib/ecore_con/ecore_con_proxy_helper.c:350:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf, "P %i %s\n", req->id, url);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:601:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, sizeof(buf),
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:613:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, sizeof(buf),
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:623:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, sizeof(buf),
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:68:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(lockfile, address);
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c:377:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)e->keyname, keyname);
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c:378:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)e->key, key);
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c:379:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (strlen(compose)) strcpy((char *)e->compose, compose);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_module.c:30:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (access(file, F_OK) == -1) return EINA_FALSE;
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:123:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy((char *)e->keyname, keyname);
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:124:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy((char *)e->key, key);
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:126:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy((char *)e->compose, compose);
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:610:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (!access(file, R_OK)) return EINA_TRUE;
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:618:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (!access(file, W_OK)) return EINA_TRUE;
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:711:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (!access(file, X_OK)) return EINA_TRUE;
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_inotify.c:145:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(path2, path);
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_poll.c:90:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(path2, path);
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_win32.c:264:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(path2, path);
data/efl-1.25.1/src/lib/ecore_file/ecore_file_path.c:51:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(env_path, env_tmp);
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c:121:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
             snprintf(buf, sizeof(buf),
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c:140:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
             snprintf(buf, sizeof(buf),
data/efl-1.25.1/src/lib/ecore_ipc/Ecore_Ipc.h:139:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy((char *)ptr, p->v); \
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:844:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)e->keyname, keyname);
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:845:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)e->key, key);
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:846:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (strlen(compose)) strcpy((char *)e->compose, compose);
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:638:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)ev->keyname, keyname);
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:639:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)ev->key, key);
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:640:18:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (comp_len) strcpy((char *)ev->compose, compose);
data/efl-1.25.1/src/lib/ecore_x/ecore_x.c:218:24:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                       strcpy(tsym, fname + 1);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_events.c:409:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)e->keyname, keyname);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_events.c:410:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)e->key, key);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_events.c:412:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy((char *)e->compose, compose);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:168:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define D(args...) fprintf(stderr, ##args)
data/efl-1.25.1/src/lib/edje/Edje_Edit.h:2027:88:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
EAPI Eina_Bool edje_edit_part_access_set(Evas_Object *obj, const char *part, Eina_Bool access);
data/efl-1.25.1/src/lib/edje/edje_cache.c:22:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(buffer, "%s/%s", ce->entry, #Tp); \
data/efl-1.25.1/src/lib/edje/edje_calc.c:1664:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                  sprintf(font2, "edje/fonts/%s", font);
data/efl-1.25.1/src/lib/edje/edje_calc.c:1684:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(font2, font);
data/efl-1.25.1/src/lib/edje/edje_calc.c:1686:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                  strcat(font2, _edje_fontset_append);
data/efl-1.25.1/src/lib/edje/edje_calc.c:2573:34:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                                 snprintf(buffer, len - 1, fmt,
data/efl-1.25.1/src/lib/edje/edje_data.c:1262:76:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   EET_DATA_DESCRIPTOR_ADD_BASIC(_edje_edd_edje_part, Edje_Part, "access", access, EET_T_UCHAR);
data/efl-1.25.1/src/lib/edje/edje_edit.c:3529:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   _PARAM_PART_COPY(access)
data/efl-1.25.1/src/lib/edje/edje_edit.c:3997:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   return rp->part->access;
data/efl-1.25.1/src/lib/edje/edje_edit.c:12226:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(pcode, name);
data/efl-1.25.1/src/lib/edje/edje_edit.c:12473:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(embryo_cc_path, sizeof(embryo_cc_path),
data/efl-1.25.1/src/lib/edje/edje_edit.c:12567:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   ret = system(buf);
data/efl-1.25.1/src/lib/edje/edje_edit.c:15569:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (rp->part->access)
data/efl-1.25.1/src/lib/edje/edje_embryo.c:314:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(ss, s);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:536:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(ss, s);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:1238:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(ss, s);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:1568:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(ss, s);
data/efl-1.25.1/src/lib/edje/edje_lua2.c:3697:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                  sprintf(font2, "edje/fonts/%s", font);
data/efl-1.25.1/src/lib/edje/edje_private.h:1225:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   unsigned char          access; /* it will be used accessibility feature */
data/efl-1.25.1/src/lib/edje/edje_private.h:2721:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	   strcpy(ss, (s));			\
data/efl-1.25.1/src/lib/edje/edje_program.c:1558:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tmps, sig);
data/efl-1.25.1/src/lib/edje/edje_program.c:1560:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(&(tmps[l1 + 1]), src);
data/efl-1.25.1/src/lib/edje/edje_text.c:280:14:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
             sprintf(font2, "edje/fonts/%s", font);
data/efl-1.25.1/src/lib/edje/edje_text.c:292:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(font2, font);
data/efl-1.25.1/src/lib/edje/edje_text.c:294:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
             strcat(font2, _edje_fontset_append);
data/efl-1.25.1/src/lib/edje/edje_util.c:4815:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (rp->part->access)
data/efl-1.25.1/src/lib/edje/edje_util.c:5472:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(tmp, "%s:", rp->part->name);
data/efl-1.25.1/src/lib/edje/edje_util.c:5700:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(tmp, EDJE_PART_PATH_SEPARATOR_STRING);
data/efl-1.25.1/src/lib/edje/edje_util.c:5701:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(tmp, path[i]);
data/efl-1.25.1/src/lib/eet/eet_node.c:543:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(tbuf,                                         \
data/efl-1.25.1/src/lib/eeze/eeze_disk.c:464:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   return access(EEZE_MOUNT_BIN, X_OK | R_OK) == 0;
data/efl-1.25.1/src/lib/eeze/eeze_disk.c:472:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   return access(EEZE_UNMOUNT_BIN, X_OK | R_OK) == 0;
data/efl-1.25.1/src/lib/eeze/eeze_disk.c:480:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   return access(EEZE_EJECT_BIN, X_OK | R_OK) == 0;
data/efl-1.25.1/src/lib/eeze/eeze_disk_libmount.c:59:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (EINA_LIKELY(access("/etc/mtab", W_OK)))
data/efl-1.25.1/src/lib/efl/interfaces/efl_gfx_path.c:1521:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pd->path_data, svg_path_data);
data/efl-1.25.1/src/lib/efl/interfaces/efl_text_markup_util.c:320:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(utf8_escape, utf8_char);
data/efl-1.25.1/src/lib/efreet/efreet_base.c:559:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(ret, "%s/%s", home, fallback);
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:150:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
     snprintf(buf, sizeof(buf), PACKAGE_BIN_DIR "/efreetd");
data/efl-1.25.1/src/lib/efreet/efreet_desktop.c:651:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(string + pos, elem);
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:874:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(dest + *len, src);
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:460:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    f = popen("kde-config --path apps", "r");
data/efl-1.25.1/src/lib/eina/eina_benchmark.c:234:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buffer,
data/efl-1.25.1/src/lib/eina/eina_benchmark.c:298:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(buffer,
data/efl-1.25.1/src/lib/eina/eina_counter.c:85:13:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        n = vsnprintf(result + *position, size, format, ap);
data/efl-1.25.1/src/lib/eina/eina_debug_chunk.c:265:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(s, str);
data/efl-1.25.1/src/lib/eina/eina_debug_private.h:17:41:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define e_debug_continue(fmt, args...) fprintf(stderr, fmt, ##args)
data/efl-1.25.1/src/lib/eina/eina_evlog.c:184:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(strings + sizeof(Eina_Evlog_Item), event);
data/efl-1.25.1/src/lib/eina/eina_evlog.c:185:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (detail_offset > 0) strcpy(strings + detail_offset, detail);
data/efl-1.25.1/src/lib/eina/eina_file.c:433:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(str, size, format, ap);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:495:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(path, dir);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:497:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
             strcat(path, filename);
data/efl-1.25.1/src/lib/eina/eina_log.c:145:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(stderr,                                          \
data/efl-1.25.1/src/lib/eina/eina_log.c:1366:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File, \
data/efl-1.25.1/src/lib/eina/eina_log.c:1370:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File, \
data/efl-1.25.1/src/lib/eina/eina_log.c:1406:19:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  vfprintf(stderr, fmt, args);
data/efl-1.25.1/src/lib/eina/eina_log.c:1413:21:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    vfprintf(stderr, fmt, args);
data/efl-1.25.1/src/lib/eina/eina_log.c:1439:14:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
             vfprintf(stderr, fmt, args);
data/efl-1.25.1/src/lib/eina/eina_log.c:2052:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(stderr, fmt, args);
data/efl-1.25.1/src/lib/eina/eina_log.c:2087:4:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vprintf(fmt, args);
data/efl-1.25.1/src/lib/eina/eina_log.c:2264:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(f, fmt, args);
data/efl-1.25.1/src/lib/eina/eina_module.c:161:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(file, length, "%s" EINA_PATH_SEP_S "%s" EINA_PATH_SEP_S "%s" EINA_PATH_SEP_S "module" SHARED_LIB_SUFFIX,
data/efl-1.25.1/src/lib/eina/eina_prefix.c:289:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(argv0, X_OK) == 0)
data/efl-1.25.1/src/lib/eina/eina_prefix.c:309:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                  if (access(buf, X_OK) == 0)
data/efl-1.25.1/src/lib/eina/eina_prefix.c:350:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(buf2 + len + 1, argv0);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:353:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
             if (access(buf, X_OK) == 0)
data/efl-1.25.1/src/lib/eina/eina_prefix.c:506:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(tmp, buf);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:513:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(magic, magicsharefile);
data/efl-1.25.1/src/lib/eina/eina_stringshare.c:673:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   size = vsnprintf(tmp, len, fmt, args);
data/efl-1.25.1/src/lib/eina/eina_value.c:819:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, sizeof(buf), "%"PRIu64, v);
data/efl-1.25.1/src/lib/eina/eina_value.c:1640:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, sizeof(buf), "%"PRId64, v);
data/efl-1.25.1/src/lib/eina/eina_value.c:2104:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        if ((sscanf(v, "%"SCNu64, &other_mem) != 1) &&
data/efl-1.25.1/src/lib/eina/eina_value.c:2105:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            (sscanf(v, "%"SCNx64, &other_mem) != 1) &&
data/efl-1.25.1/src/lib/eina/eina_value.c:2106:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            (sscanf(v, "%"SCNo64, &other_mem) != 1))
data/efl-1.25.1/src/lib/eina/eina_value.c:2149:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        if ((sscanf(v, "%"SCNd64, &other_mem) != 1) &&
data/efl-1.25.1/src/lib/eina/eina_value.c:2150:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            (sscanf(v, "%"SCNx64, &other_mem) != 1) &&
data/efl-1.25.1/src/lib/eina/eina_value.c:2151:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            (sscanf(v, "%"SCNo64, &other_mem) != 1))
data/efl-1.25.1/src/lib/eina/eina_vpath.c:354:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(path, size, format, args);
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:26:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      if ((size_t)snprintf(_buf, sizeof(_buf), _fmt, ## __VA_ARGS__) >= (sizeof(_buf) - 1)) { \
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:27:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(stderr, _err"\n", _buf); \
data/efl-1.25.1/src/lib/eldbus/eldbus_introspection.c:318:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   const char *access;
data/efl-1.25.1/src/lib/eldbus/eldbus_introspection.c:332:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (!access) goto error;
data/efl-1.25.1/src/lib/eldbus/eldbus_introspection.c:334:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (strcmp(access, "read") == 0)
data/efl-1.25.1/src/lib/eldbus/eldbus_introspection.c:336:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   else if (strcmp(access, "write") == 0)
data/efl-1.25.1/src/lib/eldbus/eldbus_introspection.c:338:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   else if (strcmp(access, "readwrite") == 0)
data/efl-1.25.1/src/lib/eldbus/eldbus_introspection.h:75:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Eldbus_Introspection_Property_Access access; /**< Property access rights */
data/efl-1.25.1/src/lib/eldbus/eldbus_message_to_eina_value.c:295:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(name, 7, ARG, z);
data/efl-1.25.1/src/lib/eldbus/eldbus_message_to_eina_value.c:440:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(name, ARG, z);
data/efl-1.25.1/src/lib/eldbus/eldbus_model_arguments.c:341:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
   if (sscanf(argument, ARGUMENT_FORMAT, &i) > 0)
data/efl-1.25.1/src/lib/eldbus/eldbus_model_proxy.c:278:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   unsigned char access;
data/efl-1.25.1/src/lib/eldbus/eldbus_model_proxy.c:285:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (!access) goto on_error;
data/efl-1.25.1/src/lib/eldbus/eldbus_model_proxy.c:287:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (!(access & PROPERTY_WRITE)) goto on_error;
data/efl-1.25.1/src/lib/eldbus/eldbus_model_proxy.c:328:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   unsigned char access;
data/efl-1.25.1/src/lib/eldbus/eldbus_model_proxy.c:333:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (!access) goto on_error;
data/efl-1.25.1/src/lib/eldbus/eldbus_model_proxy.c:334:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (!(access & PROPERTY_READ)) goto on_error;
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:87:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buffer, buffer_size, template, n);
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:96:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buffer, buffer_size, template + 4, n);
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:481:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
             snprintf(buf, sizeof(buf), EDC_PART_FIELD_ENABLE_SIG_STR,
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:487:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
             snprintf(buf, sizeof(buf), EDC_PART_FIELD_DISABLE_SIG_STR,
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:572:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
             snprintf(buf, sizeof(buf), EDC_PART_FIELD_ENABLE_SIG_STR,
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:587:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
             snprintf(buf, sizeof(buf), EDC_PART_FIELD_DISABLE_SIG_STR,
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:942:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, sizeof(buf), EDC_PART_FIELD_ENABLE_SIG_STR,
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:960:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, sizeof(buf), EDC_PART_FIELD_DISABLE_SIG_STR,
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:378:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, sizeof(buf),
data/efl-1.25.1/src/lib/elementary/efl_ui_position_manager_common.h:11:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
     Efl_Ui_Position_Manager_Size_Batch_Callback access; //this can also be the size accessor, but that does not matter here
data/efl-1.25.1/src/lib/elementary/efl_ui_position_manager_common.h:16:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
     Efl_Ui_Position_Manager_Object_Batch_Callback access; //this can also be the size accessor, but that does not matter here
data/efl-1.25.1/src/lib/elementary/efl_ui_position_manager_common.h:39:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   res = cb.size.access(cb.size.data, conf, slice);
data/efl-1.25.1/src/lib/elementary/efl_ui_position_manager_common.h:70:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   res = cb.object.access(cb.object.data, range, slice);
data/efl-1.25.1/src/lib/elementary/efl_ui_spin_button.c:94:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), fmt, pd->val);
data/efl-1.25.1/src/lib/elementary/efl_ui_spin_button.c:278:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(result + pos, input);
data/efl-1.25.1/src/lib/elementary/efl_ui_spin_button.c:279:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(result + pos + input_len, text + pos);
data/efl-1.25.1/src/lib/elementary/efl_ui_widget.c:5466:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(filter, sizeof(filter), FILTER_FMT,
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:832:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(tmp, p + 5);
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:847:29:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                            strcat(repname, dotptr);
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:537:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
     snprintf(buf, sizeof(buf), TITLE_PART);
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:539:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
     snprintf(buf, sizeof(buf), SUBTITLE_PART);
data/efl-1.25.1/src/lib/elementary/elm_atspi_bridge.c:2482:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
     snprintf(path, sizeof(path), ELM_ACCESS_OBJECT_REFERENCE_TEMPLATE, (unsigned long long)(uintptr_t)eo);
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:35:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buffer, buffer_size, template, n);
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:40:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buffer, buffer_size, template + 4, n);
data/efl-1.25.1/src/lib/elementary/elm_code_indent.c:109:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(buf + count, indent);
data/efl-1.25.1/src/lib/elementary/elm_code_widget.c:866:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
             sprintf(text, template, line->status_text);
data/efl-1.25.1/src/lib/elementary/elm_config.c:626:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   off = off + vsnprintf(dst + off, size - off, fmt, ap);
data/efl-1.25.1/src/lib/elementary/elm_config.c:691:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   off = off + vsnprintf(dst + off, size - off, fmt, ap);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2884:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(namelower, wb->name);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2917:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(namelower, name);
data/efl-1.25.1/src/lib/elementary/elm_config.c:5022:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   CONFIG_SETB(access);
data/efl-1.25.1/src/lib/elementary/elm_config.c:5225:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   CONFIG_GETB(access);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:715:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(entry_tag, len + 1, tag_string, buf);
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer_extra_gestures.c:10:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define gl_debug(x...) fprintf(stderr, __FILE__": " x)
data/efl-1.25.1/src/lib/elementary/elm_index.c:798:37:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                            label = strcat(temp, last);
data/efl-1.25.1/src/lib/elementary/elm_main.c:1042:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(exe2, exe);
data/efl-1.25.1/src/lib/elementary/elm_main.c:1047:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(exename, p);
data/efl-1.25.1/src/lib/elementary/elm_main.c:1050:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(p, exename);
data/efl-1.25.1/src/lib/elementary/elm_main.c:1051:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(p, LIBEXT);
data/efl-1.25.1/src/lib/elementary/elm_main.c:1052:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (access(exe2, R_OK | X_OK) != 0)
data/efl-1.25.1/src/lib/elementary/elm_main.c:1197:9:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execvp(argv[0], args);
data/efl-1.25.1/src/lib/elementary/elm_main.c:1356:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (!access(buf, R_OK | X_OK)) return strdup(buf);
data/efl-1.25.1/src/lib/elementary/elm_map.c:713:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), "%s" CACHE_TILE_ROOT, efreet_cache_home_get(),
data/efl-1.25.1/src/lib/elementary/elm_map.c:716:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf2, sizeof(buf2), CACHE_TILE_PATH, buf, y);
data/efl-1.25.1/src/lib/elementary/elm_map.c:3215:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(fname, sizeof(fname), "%s" CACHE_NAME_ROOT,
data/efl-1.25.1/src/lib/elementary/elm_map.c:4259:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(buf, sizeof(buf), "%s" CACHE_ROOT, efreet_cache_home_get());
data/efl-1.25.1/src/lib/elementary/elm_map.c:4654:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(fname, sizeof(fname), "%s" CACHE_ROUTE_ROOT,
data/efl-1.25.1/src/lib/elementary/elm_module.c:143:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, sizeof(buf), "%s/elementary/modules/%s/%s/module"EFL_SHARED_EXTENSION,
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:180:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
     snprintf(buf, sizeof(buf), fmt, (int)sd->val);
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:182:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
     snprintf(buf, sizeof(buf), fmt, sd->val);
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:209:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          snprintf(buf, sizeof(buf), sd->label, (int)sd->val);
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:211:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          snprintf(buf, sizeof(buf), sd->label, sd->val);
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:542:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(result + pos, input);
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:543:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(result + pos + input_len, text + pos);
data/efl-1.25.1/src/lib/elementary/elm_util.c:37:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(str + *len, txt);
data/efl-1.25.1/src/lib/elementary/elm_util.c:63:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(buf, s);
data/efl-1.25.1/src/lib/elementary/elm_web2.c:236:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
       snprintf(buf, sizeof(buf),
data/efl-1.25.1/src/lib/elementary/els_tooltip.c:12:22:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define TTDBG(x...) fprintf(stderr, STUPID(__LINE__)": " x)
data/efl-1.25.1/src/lib/elementary/els_tooltip.c:821:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf, "tooltip/%s", style);
data/efl-1.25.1/src/lib/elput/elput_evdev.c:329:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)ev->keyname, keyname);
data/efl-1.25.1/src/lib/elput/elput_evdev.c:330:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)ev->key, key);
data/efl-1.25.1/src/lib/elput/elput_evdev.c:331:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (strlen(compose)) strcpy((char *)ev->compose, compose);
data/efl-1.25.1/src/lib/elua/io.c:68:10:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   ret = popen(cmdline, md);
data/efl-1.25.1/src/lib/elua/io.c:141:8:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
   if (fscanf(f, LUA_NUMBER_SCAN, &d) == 1)
data/efl-1.25.1/src/lib/elua/io.c:285:32:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
           status = status && (fprintf(f, LUA_NUMBER_FMT,
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:106:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(funcname, GETENTRYNAME(hdr, func));
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:121:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(varname, GETENTRYNAME(hdr, var));
data/efl-1.25.1/src/lib/embryo/embryo_str.c:155:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(s3, s1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:156:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(s3, s2);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:179:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(s3, s1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:199:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(s3, s2);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:200:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(s3, s1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:225:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(s3, s1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:339:35:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                        if (cptr) snprintf(tmp, sizeof(tmp), fmt, (int)(*cptr));
data/efl-1.25.1/src/lib/embryo/embryo_str.c:347:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(s2 + o, tmp);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:367:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(s2 + o, tmp);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:388:30:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                             strcpy(s2 + o, tmp);
data/efl-1.25.1/src/lib/eo/eo_base_class.c:635:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(klass, search);
data/efl-1.25.1/src/lib/eolian/database_function_api.c:45:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, foo_id->klass->base.c_name);
data/efl-1.25.1/src/lib/eolian/eolian_priv.h:16:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(stderr, EINA_COLOR_RED "eolian" EINA_COLOR_RESET ": "
data/efl-1.25.1/src/lib/eolian/eolian_priv.h:32:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(stderr, EINA_COLOR_RED "eolian" EINA_COLOR_RESET ": "
data/efl-1.25.1/src/lib/ethumb/ethumb.c:855:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (sanitized_path && access(sanitized_path, R_OK))
data/efl-1.25.1/src/lib/ethumb/ethumb.c:1336:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(buf, dname);
data/efl-1.25.1/src/lib/ethumb/ethumb.c:1339:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(&(buf[len + 6]), e->thumb_path + len + 1);
data/efl-1.25.1/src/lib/evas/Evas_GL.h:5335:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   void* 	(*glMapBufferOES) (GLenum target, GLenum access);
data/efl-1.25.1/src/lib/evas/Evas_GL.h:5711:103:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   void*        (*glMapBufferRangeEXT) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/efl-1.25.1/src/lib/evas/Evas_GL.h:5952:101:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void *       (*glMapBufferRange) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/efl-1.25.1/src/lib/evas/Evas_GL.h:6056:122:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void         (*glBindImageTexture) (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/efl-1.25.1/src/lib/evas/canvas/evas_events.c:96:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define DDD(...) do { for (int _i = 0; _i < spaces; _i++) printf(" "); printf(__VA_ARGS__); } while (0)
data/efl-1.25.1/src/lib/evas/canvas/evas_events.c:97:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define D(...) do { printf(__VA_ARGS__); } while (0)
data/efl-1.25.1/src/lib/evas/canvas/evas_image_legacy.c:237:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tflags, flags);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3065:18:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                 strcat(font_param, font_prefix);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3770:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(format_str, temp);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:8621:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(utf8_escape, utf8_char);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:16269:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf, "<%s>", format);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:16278:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf, "</%s>", format);
data/efl-1.25.1/src/lib/evas/canvas/evas_render.c:68:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(__tmpbuf, sizeof(__tmpbuf), ##args); \
data/efl-1.25.1/src/lib/evas/canvas/evas_render.c:81:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(__tmpbuf, sizeof(__tmpbuf), ##args); \
data/efl-1.25.1/src/lib/evas/file/evas_module.c:148:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(path, libdir);
data/efl-1.25.1/src/lib/evas/file/evas_path.c:58:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(res, path);
data/efl-1.25.1/src/lib/evas/file/evas_path.c:59:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(res, EVAS_PATH_SEPARATOR);
data/efl-1.25.1/src/lib/evas/file/evas_path.c:60:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(res, end);
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:2797:24:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                       sprintf(buf, "%s = %s", db->name, db->value);
data/efl-1.25.1/src/lib/evil/evil_langinfo.c:41:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
           strcat(result, p);
data/efl-1.25.1/src/lib/evil/evil_stdlib.c:59:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(str, "%s=", name);
data/efl-1.25.1/src/lib/evil/evil_stdlib.c:61:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(str, "%s=%s", name, value);
data/efl-1.25.1/src/lib/evil/evil_stdlib.c:205:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   else if (access(file_name, 4) == 0)
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:640:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(p, ev->key);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:646:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(p, ev->keyname);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:652:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(p, ev->string);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:658:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(p, ev->compose);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:697:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(p, ev->key);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:703:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(p, ev->keyname);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:709:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(p, ev->string);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:715:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(p, ev->compose);
data/efl-1.25.1/src/modules/ecore_evas/vnc_server/ecore_evas_vnc_server.c:387:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy((char *)e->compose, buf);
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:374:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(key_string, str + 11);
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:386:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(key_string, str);
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:622:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)e->keyname, keyname);
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:623:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)e->key, key);
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:624:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char *)e->string, string);
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_engine.c:8:68:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
# error eglfs should not get compiled if dlsym is not found on the system!
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_ext_def.h:100:76:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	_EVASGL_EXT_FUNCTION_BEGIN(void *, glMapBufferOES, (GLenum target, GLenum access), (target, access))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_ext_def.h:100:94:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	_EVASGL_EXT_FUNCTION_BEGIN(void *, glMapBufferOES, (GLenum target, GLenum access), (target, access))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_ext_def.h:1029:128:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        _EVASGL_EXT_FUNCTION_BEGIN(void *, glMapBufferRangeEXT, (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access), (target, offset, length, access))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_ext_def.h:1029:162:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        _EVASGL_EXT_FUNCTION_BEGIN(void *, glMapBufferRangeEXT, (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access), (target, offset, length, access))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_gles3_def.h:73:113:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
_EVASGL_FUNCTION_BEGIN(void *, glMapBufferRange, (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access), (target, offset, length, access))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_gles3_def.h:73:147:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
_EVASGL_FUNCTION_BEGIN(void *, glMapBufferRange, (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access), (target, offset, length, access))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_gles3_def.h:166:132:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
_EVASGL_FUNCTION_BEGIN_VOID( glBindImageTexture, (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format), (unit, texture, level, layered, layer, access, format))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_gles3_def.h:166:195:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
_EVASGL_FUNCTION_BEGIN_VOID( glBindImageTexture, (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format), (unit, texture, level, layered, layer, access, format))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:7:72:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
# error gl_common should not get compiled if dlsym is not found on the system!
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:139:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(pname, SHADER_PROG_NAME_FMT, flags);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:229:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(pname, SHADER_PROG_NAME_FMT, p->flags);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:1017:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
             sprintf(pname, SHADER_PROG_NAME_FMT, flags);
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_engine.c:9:69:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
# error gl_drm should not get compiled if dlsym is not found on the system!
data/efl-1.25.1/src/modules/evas/engines/gl_generic/evas_engine.c:12:69:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
# error gl_x11 should not get compiled if dlsym is not found on the system!
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:9:69:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
# error gl_x11 should not get compiled if dlsym is not found on the system!
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1509:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tmpstr, str);
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1513:24:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
             if (str2) strcat(tmpstr, str2);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_native_dmabuf.c:10:78:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
# warning native_dmabuf should not get compiled if dlsym is not found on the system!
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_native_tbm.c:10:75:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
# warning native_tbm should not get compiled if dlsym is not found on the system!
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:132:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(img_loader, libdir);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:133:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(img_loader, loader);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:204:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(decoders[try_count], X_OK)) continue;
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:206:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(cmd, decoders[try_count]);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:229:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
             strcat(cmd, buf);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:235:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
             strcat(cmd, buf);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:242:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
             strcat(cmd, buf);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:244:13:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        f = popen(cmd, "r");
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1886:51:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                                                  strcat(col, s);
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1911:44:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                                           strcpy(tok, s);
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1923:46:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                                             strcat(col, s);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_autotools.c:17:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(path, maxlen, PACKAGE_BUILD_DIR"/src/modules/%s/%s/.libs/module"SHARED_LIB_SUFFIX, subsystem, mod_name);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_autotools.c:27:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(path, maxlen, PACKAGE_BUILD_DIR"/src/modules/%s/%s/.libs", subsystem, mod_name);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_autotools.c:37:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(path, maxlen, PACKAGE_BUILD_DIR"/src/bin/%s/%s"BIN_EXT, subsystem, bin_name);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_autotools.c:47:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(path, maxlen, PACKAGE_SRC_DIR"/data/%s/%s", subsystem, file);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c:14:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(path, maxlen, PACKAGE_BUILD_DIR"/src/modules/%s/%s/lib%s_el"MOD_SUFFIX, subsystem, mod_name, mod_name);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c:16:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(path, maxlen, PACKAGE_BUILD_DIR"/src/modules/%s/libshared_loader_%s"MOD_SUFFIX, subsystem, mod_name);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c:18:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(path, maxlen, PACKAGE_BUILD_DIR"/src/modules/%s/libshared_saver_%s"MOD_SUFFIX, subsystem, mod_name);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c:20:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(path, maxlen, PACKAGE_BUILD_DIR"/src/modules/%s/%s/lib%s"MOD_SUFFIX, subsystem, mod_name, mod_name);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c:30:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(path, maxlen, PACKAGE_BUILD_DIR"/src/modules/%s/%s/", subsystem, mod_name);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c:40:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(path, maxlen, PACKAGE_BUILD_DIR"/src/bin/%s/%s"EXE_SUFFIX, subsystem, bin_name);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c:50:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(path, maxlen, PACKAGE_SRC_DIR"/data/%s/%s", subsystem, file);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2906:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  size_t buf1len = sprintf(buf1, "%s\r\nConnection: Keep-Alive\r\nContent-Length: %lu\r\n\r\n",
data/efl-1.25.1/src/static_libs/http-parser/test.c:2943:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(total, r1->raw);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2944:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(total, r2->raw);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2945:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(total, r3->raw);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2996:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(total, r1->raw);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2997:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(total, r2->raw);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2998:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(total, r3->raw);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3352:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%s / HTTP/1.1\r\n\r\n", *this_method);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3372:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%s / HTTP/1.1\r\n\r\n", *this_method);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:231:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(stderr, __FILE__ ": ");           \
data/efl-1.25.1/src/static_libs/lz4/lz4.c:232:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(stderr, __VA_ARGS__);             \
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:118:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    fprintf(stderr, __FILE__ ": ");           \
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:119:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    fprintf(stderr, __VA_ARGS__);             \
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_audio.c:32:23:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
       int pa_check = system("pulseaudio --check");
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c:144:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(fmt, event->data);
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c:166:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(fmt, event->data);
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con_url.c:115:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(url, temp1);
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con_url.c:124:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
     strcat(url, temp1);
data/efl-1.25.1/src/tests/edje/edje_suite.c:27:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(filename, PATH_MAX, TESTS_BUILD_DIR"/data/%s", name);
data/efl-1.25.1/src/tests/efl_check.h:146:14:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
             execvp("valgrind", (char**) nav);
data/efl-1.25.1/src/tests/efl_check.h:285:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(srunner_xml_buf, sizeof(srunner_xml_buf), TESTS_BUILD_DIR "/check-results-%s.xml", n);
data/efl-1.25.1/src/tests/efl_check.h:378:21:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
                    execl("/bin/sh", "/bin/sh", "-c", PACKAGE_BUILD_DIR "/src/tests/timeout", (char *)NULL);
data/efl-1.25.1/src/tests/efl_mono/dummy_child.c:58:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char*)pd->a, a);
data/efl-1.25.1/src/tests/efl_mono/dummy_test_object.c:173:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return strcpy((char*)ret, str);
data/efl-1.25.1/src/tests/efl_mono/dummy_test_object.c:179:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ret, str);
data/efl-1.25.1/src/tests/efl_mono/dummy_test_object.c:205:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return strcpy((char*)ret, reference);
data/efl-1.25.1/src/tests/efl_mono/dummy_test_object.c:217:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char*)*str, reference);
data/efl-1.25.1/src/tests/efreet/ef_data_dirs.c:187:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(dirs, vals[i]);
data/efl-1.25.1/src/tests/efreet/ef_data_dirs.c:275:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(dirs, vals[i]);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:339:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	   strcat (big_buffer, template);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:353:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(test_file_path, (char *)test_dirname);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:354:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(test_file_path, test_file_name_part);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:356:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(test_file2_path, (char *)test_dirname);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:357:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(test_file2_path, test_file2_name_part);
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:239:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(a, sizeof(a), EINA_SLICE_FMT, EINA_SLICE_PRINT(slice));
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:243:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(a, sizeof(a), EINA_SLICE_STR_FMT, EINA_SLICE_STR_PRINT(slice));
data/efl-1.25.1/src/tests/eina/eina_test_value.c:723:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), "%"PRId64, in_i64);
data/efl-1.25.1/src/tests/eina/eina_test_value.c:785:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), "%"PRIu64, in_u64);
data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_model_method.c:30:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), FAKE_SERVER_BUS ".%s", basename(__FILE__));
data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_model_signal.c:28:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), FAKE_SERVER_BUS ".%s", basename(__FILE__));
data/efl-1.25.1/src/tests/eldbus/eldbus_test_fake_server_eldbus_model_proxy.c:34:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof(buf), FAKE_SERVER_BUS ".%s", basename(__FILE__));
data/efl-1.25.1/src/tests/elementary/efl_ui_test_config.c:90:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   CONFIG_CHKB(access, 0);
data/efl-1.25.1/src/tests/elementary/elm_test_image.c:89:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(path, pathfmt, td->image_id);
data/efl-1.25.1/src/tests/elementary/elm_test_image.c:102:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(path, pathfmt, td->image_id);
data/efl-1.25.1/src/tests/elementary/elm_test_image.c:114:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(path, pathfmt, td->image_id);
data/efl-1.25.1/src/tests/elementary/elm_test_image.c:123:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
             sprintf(path, pathfmt, ++td->image_id);
data/efl-1.25.1/src/tests/elementary/elm_test_image.c:203:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(path, pathfmt, td.image_id);
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:87:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   if (snprintf(command, PATH_MAX,
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:94:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   return system(command);
data/efl-1.25.1/src/tests/evas/evas_test_filters.c:195:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buf, "blend { color = '%s' }", colors[c]);
data/efl-1.25.1/src/benchmarks/eina/Ecore_Data.h:73:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ECORE_ERROR_ABORT")) { abort(); } \
data/efl-1.25.1/src/benchmarks/eina/Ecore_Data.h:87:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ECORE_ERROR_ABORT")) { abort(); } \
data/efl-1.25.1/src/benchmarks/eina/eina_bench_array.c:70:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_array.c:136:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:41:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:55:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:69:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:83:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:98:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:117:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:136:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_sort.c:53:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_sort.c:81:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_sort.c:108:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:56:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:90:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:120:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:152:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/bin/edje/edje_cc.c:358:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   if (!realpath(file_in, rpath) || stat(rpath, &st) || !S_ISREG(st.st_mode))
data/efl-1.25.1/src/bin/edje/edje_cc.c:390:8:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   if (realpath(file_out, rpath2) && !strcmp(rpath, rpath2))
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2344:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1075:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/bin/edje/edje_multisense_convert.c:259:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5720:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   p = (char *)getenv("CPATH");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5858:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	   epath = getenv("C_INCLUDE_PATH");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5861:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	   epath = getenv("CPLUS_INCLUDE_PATH");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5864:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	   epath = getenv("OBJC_INCLUDE_PATH");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5867:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	   epath = getenv("OBJCPLUS_INCLUDE_PATH");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6062:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       && (getenv("SUNPRO_DEPENDENCIES") != 0
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6063:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	   || getenv("DEPENDENCIES_OUTPUT") != 0))
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6065:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char               *spec = getenv("DEPENDENCIES_OUTPUT");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6071:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	     spec = getenv("SUNPRO_DEPENDENCIES");
data/efl-1.25.1/src/bin/efl/efl_debug.c:144:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
              getenv("HOME"), (long)pid);
data/efl-1.25.1/src/bin/efl_mono_msbuild_gen/main.cc:121:17:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt_long(argc, argv, options, long_options, &idx)) != -1)
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc.c:147:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   if (!realpath(file_in, rpath) || stat(rpath, &st) || !S_ISREG(st.st_mode))
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc.c:179:8:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   if (realpath(file_out, rpath2) && !strcmp(rpath, rpath2))
data/efl-1.25.1/src/bin/elementary/quicklaunch.c:203:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(domain = getenv("ELM_QUICKLAUNCH_DOMAIN")))
data/efl-1.25.1/src/bin/elementary/quicklaunch.c:205:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        domain = getenv("WAYLAND_DISPLAY");
data/efl-1.25.1/src/bin/elementary/quicklaunch.c:206:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!domain) domain = getenv("DISPLAY");
data/efl-1.25.1/src/bin/elementary/run.c:53:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(domain = getenv("ELM_QUICKLAUNCH_DOMAIN")))
data/efl-1.25.1/src/bin/elementary/run.c:55:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        domain = getenv("WAYLAND_DISPLAY");
data/efl-1.25.1/src/bin/elementary/run.c:56:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!domain) domain = getenv("DISPLAY");
data/efl-1.25.1/src/bin/elementary/run.c:59:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   rundir = getenv("XDG_RUNTIME_DIR");
data/efl-1.25.1/src/bin/elementary/run.c:82:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char *path = getenv("PATH");
data/efl-1.25.1/src/bin/elementary/test_genlist.c:382:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ELM_TEST_AUTOBOUNCE")) elm_exit();
data/efl-1.25.1/src/bin/elementary/test_genlist.c:498:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ELM_TEST_AUTOBOUNCE"))
data/efl-1.25.1/src/bin/elementary/test_genlist.c:501:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        bounce_max = atoi(getenv("ELM_TEST_AUTOBOUNCE"));
data/efl-1.25.1/src/bin/elementary/test_main_menu.c:44:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("ELM_DISABLE_EXTERNAL_MENU");
data/efl-1.25.1/src/bin/elementary/test_map.c:1099:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        srand(time(NULL));
data/efl-1.25.1/src/bin/elementary/test_scroller.c:685:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ELM_TEST_AUTOBOUNCE"))
data/efl-1.25.1/src/bin/elementary/test_scroller.c:688:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        bounce->bounce_max = atoi(getenv("ELM_TEST_AUTOBOUNCE"));
data/efl-1.25.1/src/bin/elua/main.c:67:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ((ch = getopt(argc, argv, "+LhC:M:A:l:I:E")) != -1)
data/efl-1.25.1/src/bin/eolian/main.c:517:25:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   for (int opt; (opt = getopt(argc, argv, "SI:g:o:hv")) != -1;)
data/efl-1.25.1/src/bin/eolian_cxx/eolian_cxx.cc:487:17:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt_long(argc, argv, options, long_options, &idx)) != -1)
data/efl-1.25.1/src/bin/eolian_js/main.cc:456:17:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt_long(argc, argv, options, long_options, &idx)) != -1)
data/efl-1.25.1/src/bin/eolian_js/main.cc:580:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/bin/eolian_mono/eolian_mono.cc:364:17:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt_long(argc, argv, options, long_options, &idx)) != -1)
data/efl-1.25.1/src/bin/exactness/common.c:10:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *original_pid_env = getenv("EXACTNESS_ORIGINAL_PID");
data/efl-1.25.1/src/bin/exactness/common.c:23:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *original_pid_env = getenv("EXACTNESS_ORIGINAL_PID");
data/efl-1.25.1/src/bin/exactness/player.c:1056:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *dest = getenv("EXACTNESS_DEST");
data/efl-1.25.1/src/bin/exactness/player.c:1057:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *external_injection = getenv("EXACTNESS_EXTERNAL_INJECTION");
data/efl-1.25.1/src/bin/exactness/player.c:1058:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *src = getenv("EXACTNESS_SRC");
data/efl-1.25.1/src/bin/exactness/player.c:1059:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *fonts_dir = getenv("EXACTNESS_FONTS_DIR");
data/efl-1.25.1/src/bin/exactness/player.c:1060:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *speed = getenv("EXACTNESS_SPEED");
data/efl-1.25.1/src/bin/exactness/player.c:1062:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        _scan_objects = !!getenv("EXACTNESS_SCAN_OBJECTS");
data/efl-1.25.1/src/bin/exactness/player.c:1063:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        _disable_shots = !!getenv("EXACTNESS_DISABLE_SHOTS");
data/efl-1.25.1/src/bin/exactness/player.c:1064:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        _stabilize_shots = !!getenv("EXACTNESS_STABILIZE_SHOTS");
data/efl-1.25.1/src/bin/exactness/player.c:1065:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        _verbose = !!getenv("EXACTNESS_VERBOSE");
data/efl-1.25.1/src/bin/exactness/recorder.c:286:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!_shot_key) _shot_key = getenv("SHOT_KEY");
data/efl-1.25.1/src/bin/exactness/recorder.c:324:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        _out_filename = getenv("EXACTNESS_DEST");
data/efl-1.25.1/src/bin/exactness/recorder.c:326:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!_setup_fonts_dir(getenv("EXACTNESS_FONTS_DIR")))
data/efl-1.25.1/src/examples/ecore/ecore_evas_cursor_example.c:157:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/examples/edje/edje-text.c:67:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   env = getenv("LANGUAGE");
data/efl-1.25.1/src/examples/eina/eina_value_02.c:88:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/examples/eio/efl_io_manager_ls.c:67:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   path = getenv("HOME");
data/efl-1.25.1/src/examples/eio/efl_io_manager_open.c:82:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   path = getenv("HOME");
data/efl-1.25.1/src/examples/eio/efl_io_manager_open_multi.c:76:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   path = getenv("HOME");
data/efl-1.25.1/src/examples/eio/eio_sentry.c:43:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *path = getenv("HOME");
data/efl-1.25.1/src/examples/eldbus/connect-address.c:204:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(address = getenv("IBUS_ADDRESS")))
data/efl-1.25.1/src/examples/elementary/gengrid_example.c:421:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/examples/elementary/inwin_example.c:137:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (eina_streq(getenv("ELM_ENGINE"), "shot"))
data/efl-1.25.1/src/examples/evas/evas-box.c:320:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/examples/evas/evas-images2.c:229:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/examples/evas/evas-smart-interface.c:681:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/examples/evas/evas-smart-object.c:651:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/generic/evas/common/shmfile.c:49:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/generic/evas/common/shmfile.c:73:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/generic/evas/xcf/pixelfuncs.c:717:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand(12345);
data/efl-1.25.1/src/lib/ecore/ecore.c:145:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/lib/ecore/ecore.c:267:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_FPS_DEBUG")) _ecore_fps_debug = 1;
data/efl-1.25.1/src/lib/ecore/ecore.c:295:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_MEM_STAT"))
data/efl-1.25.1/src/lib/ecore/ecore.c:310:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("WATCHDOG_USEC"))
data/efl-1.25.1/src/lib/ecore/ecore.c:312:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        double sec = ((double) atoi(getenv("WATCHDOG_USEC"))) / 1000 / 1000;
data/efl-1.25.1/src/lib/ecore/ecore.c:329:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *s = getenv("ECORE_NO_SYSTEM_MODULES");
data/efl-1.25.1/src/lib/ecore/ecore.c:336:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EFL_FIRST_LOOP"))
data/efl-1.25.1/src/lib/ecore/ecore.c:340:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                            getenv("EFL_FIRST_LOOP"));
data/efl-1.25.1/src/lib/ecore/ecore.c:436:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     if (getenv("ECORE_MEM_STAT"))
data/efl-1.25.1/src/lib/ecore/ecore.c:776:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_ERROR_ABORT")) abort();
data/efl-1.25.1/src/lib/ecore/ecore.c:797:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_ERROR_ABORT")) abort();
data/efl-1.25.1/src/lib/ecore/ecore.c:958:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("NOTIFY_SOCKET"))
data/efl-1.25.1/src/lib/ecore/ecore_alloc.c:98:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   choice = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/ecore/ecore_anim.c:403:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ECORE_ANIMATOR_SKIP")) tick_skip = EINA_TRUE;
data/efl-1.25.1/src/lib/ecore/ecore_events.c:117:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *choice = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:1104:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
           shell = getenv("SHELL");
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:800:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   var = getenv("COLUMNS");
data/efl-1.25.1/src/lib/ecore/ecore_main.c:1203:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("NOTIFY_SOCKET"))
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out_pulse.c:309:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("WAYLAND_DISPLAY")) disp = getenv("DISPLAY");
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out_pulse.c:309:43:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("WAYLAND_DISPLAY")) disp = getenv("DISPLAY");
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_pulse_ml.c:74:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("WAYLAND_DISPLAY"))
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_pulse_ml.c:76:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        disp = eina_strdup(getenv("DISPLAY"));
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_pulse_ml.c:161:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("WAYLAND_DISPLAY"))
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_pulse_ml.c:163:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        disp = eina_strdup(getenv("DISPLAY"));
data/efl-1.25.1/src/lib/ecore_buffer/ecore_buffer.c:78:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        backend_name = (const char*)getenv("ECORE_BUFFER_ENGINE");
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:106:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("LISTEN_PID") && getenv("LISTEN_FDS"))
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:106:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("LISTEN_PID") && getenv("LISTEN_FDS"))
data/efl-1.25.1/src/lib/ecore_con/ecore_con_alloc.c:69:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   choice = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/ecore_con/ecore_con_local_win32.c:375:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        computername = getenv("COMPUTERNAME");
data/efl-1.25.1/src/lib/ecore_con/ecore_con_proxy_helper.c:82:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             if (getenv("EFL_RUN_IN_TREE")) run_in_tree = 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:123:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        socks = getenv("ECORE_CON_SOCKS_V4");
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:127:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             socks = getenv("ECORE_CON_SOCKS_V5");
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_tcp.c:172:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        proxy_env = getenv("socks_proxy");
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_tcp.c:173:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!proxy_env) proxy_env = getenv("SOCKS_PROXY");
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_tcp.c:174:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!proxy_env) proxy_env = getenv("all_proxy");
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_tcp.c:175:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!proxy_env) proxy_env = getenv("ALL_PROXY");
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_tcp.c:177:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        no_proxy_env = getenv("no_proxy");
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_tcp.c:178:43:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!no_proxy_env) no_proxy_env = getenv("NO_PROXY");
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_tty.c:178:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((env = getenv("ECORE_DRM_TTY")))
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_device.c:109:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   d = getenv("ECORE_DRM2_CARD");
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_device.c:634:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_DRM2_ATOMIC_DISABLE"))
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:631:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_EVAS_FPS_DEBUG")) _ecore_evas_fps_debug = 1;
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:632:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_EVAS_RENDER_NOSYNC")) _ecore_evas_render_sync = 0;
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:647:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_EVAS_COMP_NOSYNC"))
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:649:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   else if (getenv("ECORE_EVAS_COMP_SYNC"))
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:1071:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        engine_name = getenv("ECORE_EVAS_ENGINE");
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_buffer.c:819:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_EVAS_FORCE_SYNC_RENDER"))
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_ews.c:96:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *env = getenv("ECORE_EVAS_EWS");
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_util.c:217:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_ERROR_ABORT")) abort();
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb.c:49:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("ECORE_FB_NO_VT");
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb.c:89:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("ECORE_FB_NO_VT");
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb.c:125:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((s = getenv("EVAS_FB_DEV")) &&
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_ts.c:90:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((tslib_tsdevice = getenv("TSLIB_TSDEVICE")) == NULL)
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:428:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   if (!realpath(src, realpath1)) return EINA_FALSE;
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:429:8:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   if (realpath(dst, realpath2) && !strcmp(realpath1, realpath2)) return EINA_FALSE;
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:563:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   if (!realpath(file, buf)) return strdup("");
data/efl-1.25.1/src/lib/ecore_file/ecore_file_path.c:45:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   env_tmp = getenv(env);
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_context.c:64:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *id = getenv("ECORE_IMF_MODULE");
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_context.c:73:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("WAYLAND_DISPLAY"))
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_context.c:910:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       (getenv("ECORE_IMF_INPUT_PANEL_ENABLED")))
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_context.c:927:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       (getenv("ECORE_IMF_INPUT_PANEL_ENABLED")))
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c:62:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c:74:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                  env = getenv("ECORE_IMF_MODULE");
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c:94:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   env = getenv("ECORE_IMF_MODULE");
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c:97:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((!env) && (getenv("WAYLAND_DISPLAY")) && (!getenv("DISPLAY")))
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c:97:51:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((!env) && (getenv("WAYLAND_DISPLAY")) && (!getenv("DISPLAY")))
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c:101:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((!env) && (!getenv("WAYLAND_DISPLAY")) && (getenv("DISPLAY")))
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c:101:51:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((!env) && (!getenv("WAYLAND_DISPLAY")) && (getenv("DISPLAY")))
data/efl-1.25.1/src/lib/ecore_input_evas/ecore_input_evas.c:825:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_INPUT_FIX"))
data/efl-1.25.1/src/lib/ecore_input_evas/ecore_input_evas.c:831:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        tmp = getenv("ECORE_INPUT_TIMEOUT_FIX");
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl.c:692:61:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   else if (!strcmp(interface, "zwp_e_session_recovery") && getenv("EFL_WAYLAND_SESSION_RECOVERY"))
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl.c:704:49:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   else if (!strcmp(interface, "xdg_shell") && !getenv("EFL_WAYLAND_DONT_USE_XDG_SHELL"))
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:387:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   temp = getenv("ECORE_WL_CURSOR_SIZE");
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:394:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   cursor_theme_name = getenv("ECORE_WL_CURSOR_THEME_NAME");
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_window.c:82:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        else if ((env = getenv("ECORE_IVI_SURFACE_ID")))
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_window.c:404:47:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (_ecore_wl_disp->wl.session_recovery && getenv("EFL_WAYLAND_SESSION_RECOVERY"))
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_monitor.c:169:23:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
   _ecore_win32_mod = LoadLibrary("shcore.dll");
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2.c:104:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   mod_dir = getenv("ECORE_WL2_SURFACE_MODULE_DIR");
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2.c:212:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     no_session_recovery = !!getenv("EFL_NO_WAYLAND_SESSION_RECOVERY");
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_buffer.c:615:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EVAS_WAYLAND_SHM_DISABLE_DMABUF") && dmabuf)
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_display.c:311:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            (getenv("EFL_WAYLAND_ENABLE_WWW")))
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_display.c:900:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        n = getenv("WAYLAND_DISPLAY");
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_display.c:1184:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        n = getenv("WAYLAND_DISPLAY");
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:883:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(locale = getenv("LC_ALL")))
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:884:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     if (!(locale = getenv("LC_CTYPE")))
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:885:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       if (!(locale = getenv("LANG")))
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:1492:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("ECORE_WL_CURSOR_SIZE");
data/efl-1.25.1/src/lib/ecore_x/ecore_x.c:679:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   _ecore_xlib_sync = !!getenv("ECORE_X_SYNC");
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:658:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ECORE_VSYNC_DRM_VERSION_DEBUG"))
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:665:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ECORE_VSYNC_DRM_VERSION_DEBUG"))
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:672:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ECORE_VSYNC_DRM_VERSION_DEBUG"))
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:677:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("ECORE_VSYNC_DRM_ALL"))
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:686:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             if (getenv("ECORE_VSYNC_DRM_VERSION_DEBUG"))
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:695:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ECORE_VSYNC_DRM_VERSION_DEBUG"))
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:729:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                       if (getenv("ECORE_VSYNC_DRM_VERSION_DEBUG"))
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:747:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                       if (getenv("ECORE_VSYNC_DRM_VERSION_DEBUG"))
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:766:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                       if (getenv("ECORE_VSYNC_DRM_VERSION_DEBUG"))
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:784:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                       if (getenv("ECORE_VSYNC_DRM_VERSION_DEBUG"))
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:808:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ECORE_VSYNC_DRM_VERSION_DEBUG"))
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:815:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_ANIMATOR_SKIP")) tick_skip = EINA_TRUE;
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:909:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ECORE_VSYNC_THREAD")) threaded_vsync = EINA_TRUE;
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:910:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ECORE_VSYNC_NO_THREAD")) threaded_vsync = EINA_FALSE;
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:914:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ECORE_NO_VSYNC")) vsync_veto = 1;
data/efl-1.25.1/src/lib/edje/edje_cache.c:102:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EDJE_DUMP_PROGRAMS")) dump_programs = 1;
data/efl-1.25.1/src/lib/edje/edje_main.c:42:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/lib/edje/edje_main.c:124:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   _edje_language = eina_stringshare_add(getenv("LANGUAGE"));
data/efl-1.25.1/src/lib/edje/edje_message_queue.c:953:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             const char *s = getenv("EDJE_SELF_FEED_DEBUG");
data/efl-1.25.1/src/lib/edje/edje_module.c:37:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   run_in_tree = !!getenv("EFL_RUN_IN_TREE");
data/efl-1.25.1/src/lib/edje/edje_module.c:99:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if (getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/lib/eet/eet_alloc.c:57:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   choice = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/eet/eet_node.c:786:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/eeze/eeze_sensor.c:112:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       (getenv("EFL_RUN_IN_TREE")))
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:5295:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   env = getenv("WAYLAND_DISPLAY");
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:5298:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EFL_CANVAS_WL_DEBUG"))
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:5300:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        dbg = eina_strdup(getenv("WAYLAND_DEBUG"));
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:5304:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EFL_CANVAS_WL_DEBUG"))
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:5310:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   c->env = eina_strdup(getenv("WAYLAND_DISPLAY"));
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:5532:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   disp = getenv("DISPLAY");
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:5535:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   env = getenv("WAYLAND_DISPLAY");
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:5540:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        gl = getenv("ELM_ACCEL");
data/efl-1.25.1/src/lib/efl_mono/efl_custom_exports_mono.c:208:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   return getenv(name);
data/efl-1.25.1/src/lib/efreet/efreet.c:51:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("SUDO_UID");
data/efl-1.25.1/src/lib/efreet/efreet.c:57:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("SUDO_GID");
data/efl-1.25.1/src/lib/efreet/efreet.c:313:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   p = getenv(env);
data/efl-1.25.1/src/lib/efreet/efreet.c:348:45:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     efreet_language = eina_stringshare_add(getenv(env));
data/efl-1.25.1/src/lib/efreet/efreet_base.c:324:57:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    snprintf(buf, sizeof(buf), "%s\\Efl;%s;", data_dir, getenv("APPDATA"));
data/efl-1.25.1/src/lib/efreet/efreet_base.c:331:58:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    xdg_config_dirs = efreet_dirs_get("XDG_CONFIG_DIRS", getenv("APPDATA"));
data/efl-1.25.1/src/lib/efreet/efreet_base.c:375:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      dir = getenv(key);
data/efl-1.25.1/src/lib/efreet/efreet_base.c:414:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      path = getenv(key);
data/efl-1.25.1/src/lib/efreet/efreet_base.c:483:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                    val = getenv(env);
data/efl-1.25.1/src/lib/efreet/efreet_base.c:514:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    env = getenv(key);
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:135:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EFREETD_CONNECT_TRIES");
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:141:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EFREETD_CONNECT_TRY_GAP");
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:336:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    run_in_tree = !!getenv("EFL_RUN_IN_TREE");
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:405:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     efreet_menu_prefix = getenv("XDG_MENU_PREFIX");
data/efl-1.25.1/src/lib/eina/eina_cow.c:308:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/eina/eina_cow.c:348:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/eina/eina_cpu.c:318:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EINA_CPU_FAKE"))
data/efl-1.25.1/src/lib/eina/eina_cpu.c:319:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     _cpu_count = atoi(getenv("EINA_CPU_FAKE"));
data/efl-1.25.1/src/lib/eina/eina_debug.c:727:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EFL_NODEBUG") && !_debug_disabled)
data/efl-1.25.1/src/lib/eina/eina_debug_bt_file.c:114:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *pathstr = getenv("PATH");
data/efl-1.25.1/src/lib/eina/eina_debug_bt_file.c:147:13:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        if (realpath(fname, buf)) file = buf;
data/efl-1.25.1/src/lib/eina/eina_file_common.c:1114:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EINA_STATGEN")) _eina_statgen = 1;
data/efl-1.25.1/src/lib/eina/eina_freeq.c:385:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        s = getenv("EINA_FREEQ_BYPASS");
data/efl-1.25.1/src/lib/eina/eina_freeq.c:400:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        s = getenv("EINA_FREEQ_FILL_MAX");
data/efl-1.25.1/src/lib/eina/eina_freeq.c:402:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        s = getenv("EINA_FREEQ_TOTAL_MAX");
data/efl-1.25.1/src/lib/eina/eina_freeq.c:404:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        s = getenv("EINA_FREEQ_MEM_MAX");
data/efl-1.25.1/src/lib/eina/eina_freeq.c:406:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        s = getenv("EINA_FREEQ_FILL");
data/efl-1.25.1/src/lib/eina/eina_freeq.c:408:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        s = getenv("EINA_FREEQ_FILL_FREED");
data/efl-1.25.1/src/lib/eina/eina_list.c:509:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/eina/eina_log.c:1126:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(start = getenv(EINA_LOG_ENV_LEVELS)))
data/efl-1.25.1/src/lib/eina/eina_log.c:1173:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(start = getenv(EINA_LOG_ENV_LEVELS_GLOB)))
data/efl-1.25.1/src/lib/eina/eina_log.c:1500:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((tmp = getenv(EINA_LOG_ENV_BACKTRACE)))
data/efl-1.25.1/src/lib/eina/eina_log.c:1504:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((tmp = getenv(EINA_LOG_ENV_COLOR_DISABLE)))
data/efl-1.25.1/src/lib/eina/eina_log.c:1517:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!eina_log_term_color_supported(getenv("TERM")))
data/efl-1.25.1/src/lib/eina/eina_log.c:1541:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("NOTIFY_SOCKET") && !getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/lib/eina/eina_log.c:1541:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("NOTIFY_SOCKET") && !getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/lib/eina/eina_log.c:1545:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EINA_LOG_TIMING"))
data/efl-1.25.1/src/lib/eina/eina_log.c:1548:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((tmp = getenv(EINA_LOG_ENV_FILE_DISABLE)) && (atoi(tmp) == 1))
data/efl-1.25.1/src/lib/eina/eina_log.c:1551:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((tmp = getenv(EINA_LOG_ENV_FUNCTION_DISABLE)) && (atoi(tmp) == 1))
data/efl-1.25.1/src/lib/eina/eina_log.c:1554:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((tmp = getenv(EINA_LOG_ENV_ABORT)) && (atoi(tmp) == 1))
data/efl-1.25.1/src/lib/eina/eina_log.c:1557:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((tmp = getenv(EINA_LOG_ENV_ABORT_LEVEL)))
data/efl-1.25.1/src/lib/eina/eina_log.c:1563:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((level = getenv(EINA_LOG_ENV_LEVEL)))
data/efl-1.25.1/src/lib/eina/eina_main.c:286:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/lib/eina/eina_main.c:291:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((getenv("EINA_MTRACE")) && (getenv("MALLOC_TRACE")))
data/efl-1.25.1/src/lib/eina/eina_main.c:291:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((getenv("EINA_MTRACE")) && (getenv("MALLOC_TRACE")))
data/efl-1.25.1/src/lib/eina/eina_main.c:321:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EINA_DEBUG_THREADS"))
data/efl-1.25.1/src/lib/eina/eina_main.c:322:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     _eina_threads_debug = atoi(getenv("EINA_DEBUG_THREADS"));
data/efl-1.25.1/src/lib/eina/eina_matrixsparse.c:859:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/eina/eina_mempool.c:75:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EINA_MEMPOOL_PASS")) mempool_pass = 1;
data/efl-1.25.1/src/lib/eina/eina_module.c:309:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EINA_MODULE_LAZY_LOAD")) flag = RTLD_LAZY;
data/efl-1.25.1/src/lib/eina/eina_module.c:454:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   env_dir = getenv(env);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:307:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
             if (realpath(joined, buf))
data/efl-1.25.1/src/lib/eina/eina_prefix.c:330:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   path = getenv("PATH");
data/efl-1.25.1/src/lib/eina/eina_prefix.c:351:13:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        if (realpath(buf2, buf))
data/efl-1.25.1/src/lib/eina/eina_prefix.c:382:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv(env);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:425:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((prefix = getenv(env))) STRDUP_REP(pfx->prefix_path, prefix);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:510:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (magicsharefile && (!getenv("EFL_RUN_IN_TREE")))
data/efl-1.25.1/src/lib/eina/eina_prefix.c:585:38:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
                       char *rlink = realpath(info_dl.dli_fname, NULL);
data/efl-1.25.1/src/lib/eina/eina_promise.c:542:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *choice = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/eina/eina_quadtree.c:911:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/eina/eina_rectangle.c:539:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c:217:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/eina/eina_util.c:58:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   home = getenv("USERPROFILE");
data/efl-1.25.1/src/lib/eina/eina_util.c:59:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!home) home = getenv("WINDIR");
data/efl-1.25.1/src/lib/eina/eina_util.c:61:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       (getenv("HOMEDRIVE") && getenv("HOMEPATH")))
data/efl-1.25.1/src/lib/eina/eina_util.c:61:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       (getenv("HOMEDRIVE") && getenv("HOMEPATH")))
data/efl-1.25.1/src/lib/eina/eina_util.c:66:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                 getenv("HOMEDRIVE"), getenv("HOMEPATH"));
data/efl-1.25.1/src/lib/eina/eina_util.c:66:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                 getenv("HOMEDRIVE"), getenv("HOMEPATH"));
data/efl-1.25.1/src/lib/eina/eina_util.c:73:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getuid() == geteuid()) home = getenv("HOME");
data/efl-1.25.1/src/lib/eina/eina_util.c:104:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("TMP");
data/efl-1.25.1/src/lib/eina/eina_util.c:105:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!tmp) tmp = getenv("TEMP");
data/efl-1.25.1/src/lib/eina/eina_util.c:106:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!tmp) tmp = getenv("USERPROFILE");
data/efl-1.25.1/src/lib/eina/eina_util.c:107:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!tmp) tmp = getenv("WINDIR");
data/efl-1.25.1/src/lib/eina/eina_util.c:114:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        tmp = getenv("TMPDIR");
data/efl-1.25.1/src/lib/eina/eina_util.c:115:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!tmp) tmp = getenv("TMP");
data/efl-1.25.1/src/lib/eina/eina_util.c:116:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!tmp) tmp = getenv("TEMPDIR");
data/efl-1.25.1/src/lib/eina/eina_util.c:117:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!tmp) tmp = getenv("TEMP");
data/efl-1.25.1/src/lib/eina/eina_value.c:5428:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:36:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      s = getenv(_env); \
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:45:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      s = getenv(_env); \
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:63:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(s = getenv("APPDATA")))
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:71:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((getuid() != geteuid()) || (!(s = getenv(_env)))) { \
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:79:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(s = getenv(_env))) { \
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:119:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((getuid() != geteuid()) || (!(s = getenv("XDG_RUNTIME_DIR"))))
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:121:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(s = getenv("XDG_RUNTIME_DIR")))
data/efl-1.25.1/src/lib/eio/eio_monitor.c:378:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EIO_MONITOR_POLL")) monpoll = 1;
data/efl-1.25.1/src/lib/eio/eio_monitor_cocoa.c:200:17:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   realPathOk = realpath(path, realPath);
data/efl-1.25.1/src/lib/eio/eio_monitor_cocoa.c:206:27:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
             realPathOk = realpath("./", realPath);
data/efl-1.25.1/src/lib/eio/eio_monitor_cocoa.c:210:27:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
             realPathOk = realpath(dname, realPath);
data/efl-1.25.1/src/lib/elementary/efl_ui_focus_manager_calc.c:1941:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tmp = getenv("EINA_MEMPOOL");
data/efl-1.25.1/src/lib/elementary/efl_ui_widget.c:1580:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             if (getenv("ELM_ERROR_ABORT")) abort_on_warn = 1;
data/efl-1.25.1/src/lib/elementary/efl_ui_widget.c:2845:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ELM_ERROR_ABORT")) abort_on_warn = 1;
data/efl-1.25.1/src/lib/elementary/efl_ui_widget.c:2900:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ELM_ERROR_ABORT")) abort_on_warn = 1;
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:1601:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ELM_PROFILE")) return;
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:5034:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   env = getenv("ELM_ACCEL");
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:5058:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EFL_WIN_FRAME_MODE");
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:5270:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        disp = getenv("ELM_DISPLAY");
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:5366:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                 getenv("DISPLAY") && !getenv("ELM_ENGINE"))
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:5366:40:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                 getenv("DISPLAY") && !getenv("ELM_ENGINE"))
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:5382:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                 getenv("WAYLAND_DISPLAY") && !getenv("ELM_ENGINE"))
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:5382:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                 getenv("WAYLAND_DISPLAY") && !getenv("ELM_ENGINE"))
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:5575:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ELM_FIRST_FRAME"))
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:5577:55:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                             _elm_win_first_frame_do, getenv("ELM_FIRST_FRAME"));
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:5656:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *env = getenv("WAYLAND_DISPLAY");
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:6263:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *s = getenv("DESKTOP");
data/efl-1.25.1/src/lib/elementary/elm_config.c:648:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv(env);
data/efl-1.25.1/src/lib/elementary/elm_conform.c:70:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(env_val = getenv(part))) return EINA_FALSE;
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:49:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("ELM_ERROR_ABORT")) abort(); \
data/efl-1.25.1/src/lib/elementary/elm_interface_fileselector.h:13:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       if (getenv("ELM_ERROR_ABORT")) abort(); \
data/efl-1.25.1/src/lib/elementary/elm_interface_scrollable.c:3007:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ELS_SCROLLER_SMOOTH_DEBUG")) _elm_scroll_smooth_debug = 1;
data/efl-1.25.1/src/lib/elementary/elm_interface_scrollable.h:240:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       if (getenv("ELM_ERROR_ABORT")) abort();                               \
data/efl-1.25.1/src/lib/elementary/elm_main.c:92:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   eval = getenv("ELM_NO_FINGER_WAGGLING");
data/efl-1.25.1/src/lib/elementary/elm_main.c:352:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EFL_RUN_IN_TREE")) return EINA_FALSE;
data/efl-1.25.1/src/lib/elementary/elm_main.c:395:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   lang = getenv("LANG");
data/efl-1.25.1/src/lib/elementary/elm_main.c:397:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     lang = getenv("LC_MESSAGES");
data/efl-1.25.1/src/lib/elementary/elm_main.c:399:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     lang = getenv("LC_ALL");
data/efl-1.25.1/src/lib/elementary/elm_main.c:592:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/lib/elementary/elm_main.c:769:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   _running_in_tree = !!getenv("EFL_RUN_IN_TREE");
data/efl-1.25.1/src/lib/elementary/elm_main.c:1328:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        path = getenv("PATH");
data/efl-1.25.1/src/lib/elementary/elm_map.c:4173:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/lib/elementary/elm_module.c:136:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/lib/elput/elput_evdev.c:209:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(locale = getenv("LC_ALL")))
data/efl-1.25.1/src/lib/elput/elput_evdev.c:210:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     if (!(locale = getenv("LC_CTYPE")))
data/efl-1.25.1/src/lib/elput/elput_evdev.c:211:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       if (!(locale = getenv("LANG")))
data/efl-1.25.1/src/lib/elput/elput_logind.c:41:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *s = getenv("EFL_ELOGIND_LIB");
data/efl-1.25.1/src/lib/elua/elua.c:267:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (ignore_env || !(coredir = getenv("ELUA_CORE_DIR")) || !coredir[0])
data/efl-1.25.1/src/lib/elua/elua.c:281:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (ignore_env || !(moddir = getenv("ELUA_MODULES_DIR")) || !moddir[0])
data/efl-1.25.1/src/lib/elua/elua.c:295:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (ignore_env || !(appsdir = getenv("ELUA_APPS_DIR")) || !appsdir[0])
data/efl-1.25.1/src/lib/elua/elua.c:425:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   e = getenv("LANGUAGE");
data/efl-1.25.1/src/lib/elua/elua.c:427:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   e = getenv("LC_ALL");
data/efl-1.25.1/src/lib/elua/elua.c:429:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   e = getenv("LC_MESSAGES");
data/efl-1.25.1/src/lib/elua/elua.c:431:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   e = getenv("LANG");
data/efl-1.25.1/src/lib/elua/io.c:24:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   if (!realpath(fname, pbuf))
data/efl-1.25.1/src/lib/embryo/embryo_main.c:28:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/lib/embryo/embryo_time.c:99:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   tzenv = getenv("TZ");
data/efl-1.25.1/src/lib/emotion/emotion_modules.c:64:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/lib/emotion/emotion_modules.c:343:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((!name) && getenv("EMOTION_ENGINE"))
data/efl-1.25.1/src/lib/emotion/emotion_modules.c:345:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        name = getenv("EMOTION_ENGINE");
data/efl-1.25.1/src/lib/emotion/emotion_modules.c:349:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("WAYLAND_DISPLAY"))
data/efl-1.25.1/src/lib/emotion/emotion_modules.c:351:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        disp = eina_strdup(getenv("DISPLAY"));
data/efl-1.25.1/src/lib/eo/eo.c:3113:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                            (void *)id, getenv("EO_LIFECYCLE_DEBUG"), getenv("EO_LIFECYCLE_NO_DEBUG"));
data/efl-1.25.1/src/lib/eo/eo.c:3113:71:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                            (void *)id, getenv("EO_LIFECYCLE_DEBUG"), getenv("EO_LIFECYCLE_NO_DEBUG"));
data/efl-1.25.1/src/lib/eo/eo.c:3119:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                            (void *)id, getenv("EO_LIFECYCLE_DEBUG"));
data/efl-1.25.1/src/lib/eo/eo.c:3125:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                            (void *)id, getenv("EO_LIFECYCLE_NO_DEBUG"));
data/efl-1.25.1/src/lib/eo/eo.c:3327:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EO_LIFECYCLE_BACKTRACE");
data/efl-1.25.1/src/lib/eo/eo.c:3339:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EO_LIFECYCLE_DEBUG");
data/efl-1.25.1/src/lib/eo/eo.c:3406:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EO_LIFECYCLE_NO_DEBUG");
data/efl-1.25.1/src/lib/eo/eo_base_class.c:2819:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   _eo_nostep_alloc = !!getenv("EO_NOSTEP_ALLOC");
data/efl-1.25.1/src/lib/eolian/database_check.c:269:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   Eina_Bool check_beta = !!getenv("EOLIAN_CHECK_NAMESPACES_BETA");
data/efl-1.25.1/src/lib/eolian/database_validate.c:1690:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      !!getenv("EFL_RUN_IN_TREE"),
data/efl-1.25.1/src/lib/eolian/database_validate.c:1691:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      !!getenv("EOLIAN_CLASS_UNIMPLEMENTED_BETA_WARN"),
data/efl-1.25.1/src/lib/ethumb/ethumb.c:160:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/lib/evas/canvas/evas_main.c:158:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_LOCK_DEBUG"))
data/efl-1.25.1/src/lib/evas/canvas/evas_main.c:161:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
         lockmax = atoi(getenv("EVAS_LOCK_DEBUG"));
data/efl-1.25.1/src/lib/evas/canvas/evas_render.c:3320:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_RENDER_DEBUG_UPDATE_BOXES")) show_update_boxes = 1;
data/efl-1.25.1/src/lib/evas/canvas/evas_render.c:3425:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_PREPARE")) prepare = !!atoi(getenv("EVAS_PREPARE"));
data/efl-1.25.1/src/lib/evas/canvas/evas_render.c:3425:54:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_PREPARE")) prepare = !!atoi(getenv("EVAS_PREPARE"));
data/efl-1.25.1/src/lib/evas/common/evas_cpu.c:20:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_CPU_NO_MMX"))
data/efl-1.25.1/src/lib/evas/common/evas_cpu.c:24:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_CPU_NO_MMX2"))
data/efl-1.25.1/src/lib/evas/common/evas_cpu.c:28:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_CPU_NO_SSE"))
data/efl-1.25.1/src/lib/evas/common/evas_cpu.c:33:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_CPU_NO_SSE3"))
data/efl-1.25.1/src/lib/evas/common/evas_cpu.c:41:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_CPU_NO_ALTIVEC"))
data/efl-1.25.1/src/lib/evas/common/evas_cpu.c:49:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_CPU_NO_NEON"))
data/efl-1.25.1/src/lib/evas/common/evas_cpu.c:58:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_CPU_NO_NEON"))
data/efl-1.25.1/src/lib/evas/common/evas_cpu.c:63:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_CPU_NO_SVE"))
data/efl-1.25.1/src/lib/evas/common/evas_font_main.c:45:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EVAS_FONT_DPI");
data/efl-1.25.1/src/lib/evas/common/evas_image_main.c:106:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *s = getenv("EVAS_IMAGE_NO_MMAP");
data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c:122:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EVAS_SCALECACHE_SIZE");
data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c:124:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EVAS_SCALECACHE_MAX_DIMENSION");
data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c:126:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EVAS_SCALECACHE_MAX_FLOP_COUNT");
data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c:128:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EVAS_SCALECACHE_MAX_ITEMS");
data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c:130:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EVAS_SCALECACHE_MIN_USES");
data/efl-1.25.1/src/lib/evas/file/evas_module.c:123:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             if (getenv("EFL_RUN_IN_TREE")) run_in_tree = 1;
data/efl-1.25.1/src/lib/evas/file/evas_module.c:454:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EFL_RUN_IN_TREE")) run_in_tree = 1;
data/efl-1.25.1/src/lib/evas/file/evas_module.c:575:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EFL_RUN_IN_TREE")) run_in_tree = 1;
data/efl-1.25.1/src/lib/evas/file/evas_module.c:735:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_NOCLEAN")) noclean = 1;
data/efl-1.25.1/src/lib/evas/file/evas_path.c:147:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   if (!realpath(file, buf)) return NULL;
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:2309:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:2310:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     pfx = getenv("EFL_EVAS_FILTER_LUA_PREFIX");
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_manager.c:165:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EFL_RUN_IN_TREE"))
data/efl-1.25.1/src/lib/evas/include/evas_private.h:1517:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       tmp = getenv("EINA_MEMPOOL"); \
data/efl-1.25.1/src/lib/evas/main.c:25:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *tmp = getenv("EVAS_DEBUG_SHOW");
data/efl-1.25.1/src/lib/evas/main.c:31:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_DEBUG_ABORT")) _evas_debug_abort = 1;
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:82:21:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
           module = LoadLibrary(wpath);
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:86:18:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        module = LoadLibraryEx(new_path, NULL,
data/efl-1.25.1/src/lib/evil/evil_stdlib.c:46:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   old_name = getenv(name);
data/efl-1.25.1/src/lib/evil/evil_stdlib.c:190:1:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
realpath(const char *file_name, char *resolved_name)
data/efl-1.25.1/src/lib/evil/evil_stdlib.h:117:12:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
EAPI char *realpath(const char *file_name, char *resolved_name);
data/efl-1.25.1/src/modules/ecore_evas/engines/drm/ecore_evas_drm.c:155:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!device) device = getenv("XDG_SEAT");
data/efl-1.25.1/src/modules/ecore_evas/engines/drm/ecore_evas_drm.c:960:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   num = getenv("EVAS_DRM_VSYNC");
data/efl-1.25.1/src/modules/ecore_evas/engines/drm/ecore_evas_drm.c:1019:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("ECORE_EVAS_DRM_GPU_CLOCK_WRONG"))
data/efl-1.25.1/src/modules/ecore_evas/engines/drm/ecore_evas_drm.c:1078:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_EVAS_FORCE_SYNC_RENDER"))
data/efl-1.25.1/src/modules/ecore_evas/engines/fb/ecore_evas_fb.c:231:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("ECORE_EVAS_FB_TS_ALWAYS");
data/efl-1.25.1/src/modules/ecore_evas/engines/sdl/ecore_evas_sdl.c:220:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_EVAS_FPS_DEBUG")) _ecore_evas_fps_debug = 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/wayland/ecore_evas_wayland_common.c:3113:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_EVAS_FORCE_SYNC_RENDER") ||
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:209:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((id = getenv("DESKTOP_STARTUP_ID")))
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:1739:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((bug = getenv("ECORE_EVAS_GL_FIRST_MAP_BUG")))
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:2729:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((id = getenv("DESKTOP_STARTUP_ID")))
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:2884:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((id = getenv("DESKTOP_STARTUP_ID")))
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:4823:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_EVAS_FORCE_SYNC_RENDER"))
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:4861:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((id = getenv("DESKTOP_STARTUP_ID")))
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:4904:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             if (getenv("REDRAW_DEBUG"))
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:4905:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
               redraw_debug = atoi(getenv("REDRAW_DEBUG"));
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:5024:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("ECORE_EVAS_FORCE_SYNC_RENDER"))
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:5103:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             if (getenv("REDRAW_DEBUG"))
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:5104:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
               redraw_debug = atoi(getenv("REDRAW_DEBUG"));
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:5374:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((id = getenv("DESKTOP_STARTUP_ID")))
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:5542:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             if (getenv("REDRAW_DEBUG"))
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:5543:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
               redraw_debug = atoi(getenv("REDRAW_DEBUG"));
data/efl-1.25.1/src/modules/ecore_imf/ibus/ibus_imcontext.c:299:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((display_name = getenv("DISPLAY")))
data/efl-1.25.1/src/modules/ecore_imf/ibus/ibus_imcontext.c:348:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("IBUS_ENABLE_SYNC_MODE");
data/efl-1.25.1/src/modules/ecore_imf/ibus/ibus_module.c:74:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("DISPLAY")) return EINA_FALSE;
data/efl-1.25.1/src/modules/ecore_imf/ibus/ibus_module.c:75:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((s = getenv("ELM_DISPLAY")))
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:1707:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *p = getenv("DISPLAY");
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_module.cpp:62:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!getenv("DISPLAY")) return EINA_FALSE;
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_module.cpp:63:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((s = getenv("ELM_DISPLAY")))
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_module.c:159:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("WAYLAND_DISPLAY")) return EINA_FALSE;
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_module.c:160:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((s = getenv("ELM_DISPLAY")))
data/efl-1.25.1/src/modules/ecore_imf/xim/ecore_imf_xim.c:777:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("DISPLAY")) return EINA_FALSE;
data/efl-1.25.1/src/modules/ecore_imf/xim/ecore_imf_xim.c:778:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((s = getenv("ELM_DISPLAY")))
data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.c:1204:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EMOTION_FPS_DEBUG")) debug_fps = EINA_TRUE;
data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.c:1565:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                          if (getenv("EMOTION_GSTREAMER_DOT"))
data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.c:1569:66:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                                                                 getenv("EMOTION_GSTREAMER_DOT"));
data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.c:1706:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EMOTION_GSTREAMER_DOT"))
data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.c:1710:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                                               getenv("EMOTION_GSTREAMER_DOT"));
data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.c:1733:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EMOTION_GSTREAMER_DOT"))
data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.c:1737:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                                               getenv("EMOTION_GSTREAMER_DOT"));
data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.c:1806:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EMOTION_GSTREAMER_DOT"))
data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.c:1810:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                                               getenv("EMOTION_GSTREAMER_DOT"));
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_engine.c:226:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_INFO")) printf("EGL EXTN:\n%s\n", str);
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_engine.c:229:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        s = getenv("EVAS_GL_PARTIAL_DISABLE");
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_engine.c:242:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_INFO")) printf("NO EGL EXTN!\n");
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_outbuf.c:337:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_outbuf.c:355:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((blacklist) && (!getenv("EVAS_GL_NO_BLACKLIST")))
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_outbuf.c:403:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((num = getenv("EVAS_EGLFS_BUFFERS")))
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_outbuf.c:410:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((num = getenv("EVAS_EGLFS_VSYNC")))
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_outbuf.c:499:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO")) printf("resurf %p\n", ob);
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_outbuf.c:523:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EVAS_GL_WIN_RESURF")) return;
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_outbuf.c:524:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO")) printf("unsurf %p\n", ob);
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:771:46:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   DBG("device=%d, $EVAS_FB_DEV=%s", device, getenv("EVAS_FB_DEV"));
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:777:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((s = getenv("EVAS_FB_DEV")) &&
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:323:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EVAS_GL_MAPBUFFER_DISABLE"))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:917:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:959:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             s = getenv("EVAS_GL_NO_MAP_IMAGE_SEC");
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:998:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        s = getenv("EVAS_GL_VERTEX_MAX");
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:1023:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!getenv("EVAS_GL_MAPBUFFER"))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:1031:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
           const char *__v = getenv(name); \
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:1047:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        s = (const char *)getenv("EVAS_GL_GET_PROGRAM_BINARY");
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:1093:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:1528:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_DBG")) dbgflushnum = 1;
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:1913:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((s = getenv("EVAS_GL_DIRECT_OVERRIDE")))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:1923:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((s = getenv("EVAS_GL_DIRECT_MEM_OPT")))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:1932:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EVAS_GL_DIRECT_OVERRIDE_FORCE_OFF");
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:1938:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EVAS_GL_DIRECT_SCISSOR_OFF");
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:1944:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EVAS_GL_API_DEBUG");
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:2928:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_UNSAFE_EXTENSIONS"))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_file_cache.c:79:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   home = getenv("HOME");
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_line.c:61:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!getenv("EVAS_GL_LINE_OFFSET_HACK_DISABLE"))
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_preload.c:330:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *s = getenv("EVAS_GL_PRELOAD");
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_preload.c:348:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *s = getenv("EVAS_GL_PRELOAD");
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:459:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        evas_gl_shader_glsl_version = getenv("EVAS_GL_SHADER_GLSL_VERSION");
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:187:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_MEMINFO")) printit = 1;
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_engine.c:295:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_INFO")) printf("EGL EXTN:\n%s\n", str);
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_engine.c:298:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        s = getenv("EVAS_GL_PARTIAL_DISABLE");
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_engine.c:319:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_INFO")) printf("NO EGL EXTN!\n");
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_outbuf.c:330:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_outbuf.c:348:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((blacklist) && (!getenv("EVAS_GL_NO_BLACKLIST")))
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_outbuf.c:503:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO")) printf("resurf %p\n", ob);
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_outbuf.c:529:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EVAS_GL_WIN_RESURF")) return;
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_outbuf.c:530:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO")) printf("unsurf %p\n", ob);
data/efl-1.25.1/src/modules/evas/engines/gl_generic/Evas_Engine_GL_Shared.h:22:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EVAS_GL_SWAP_MODE");
data/efl-1.25.1/src/modules/evas/engines/gl_generic/evas_engine.c:2402:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   ector_backend = getenv("ECTOR_BACKEND");
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1438:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1441:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((s = getenv("EVAS_GL_PARTIAL_DISABLE")) && atoi(s))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1491:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1515:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1546:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1602:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_SWAP_BUFFER_DEBUG_ALWAYS"))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1611:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            ((debug_dir = getenv("EVAS_GL_SWAP_BUFFER_DEBUG_DIR"))))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:3023:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_PARTIAL_DEBUG")) partial_render_debug = 1;
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:3047:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!(platform_env = getenv("EGL_PLATFORM")))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:354:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:371:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((blacklist) && (!getenv("EVAS_GL_NO_BLACKLIST")))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:503:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:577:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((blacklist) && (!getenv("EVAS_GL_NO_BLACKLIST")))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:794:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EVAS_GL_WIN_RESURF")) return;
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:795:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO")) printf("unsurf %p\n", gw);
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:827:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO")) printf("resurf %p\n", gw);
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:952:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            ((s = getenv("EVAS_GL_DISABLE_GLES3")) && (atoi(s) == 1)))
data/efl-1.25.1/src/modules/evas/engines/software_generic/Evas_Engine_Software_Generic.h:175:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   s = getenv("EVAS_GL_PARTIAL_MERGE");
data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_engine.c:243:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((s = getenv("EVAS_NO_DRI_SWAPBUF")) != NULL)
data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_dri_image.c:321:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_NO_DRI2_CACHE"))
data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_swapper.c:440:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_SWAPPER_DEBUG")) swap_debug = 1;
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_engine.c:185:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_engine.c:188:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((s = getenv("EVAS_GL_PARTIAL_DISABLE")) && atoi(s))
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_engine.c:234:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_engine.c:516:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((s = getenv("EVAS_GL_SWAP_MODE")))
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_wl_main.c:169:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO"))
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_wl_main.c:185:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((blacklist) && (!getenv("EVAS_GL_NO_BLACKLIST")))
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_wl_main.c:310:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EVAS_GL_WIN_RESURF")) return;
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_wl_main.c:311:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO")) printf("unsurf %p\n", gw);
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_wl_main.c:336:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_GL_INFO")) printf("resurf %p\n", gw);
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_autotools.c:15:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EFL_RUN_IN_TREE")) return EINA_FALSE;
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_autotools.c:25:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EFL_RUN_IN_TREE")) return EINA_FALSE;
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_autotools.c:35:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EFL_RUN_IN_TREE")) return EINA_FALSE;
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_autotools.c:45:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EFL_RUN_IN_TREE")) return EINA_FALSE;
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c:9:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EFL_RUN_IN_TREE")) return EINA_FALSE;
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c:28:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EFL_RUN_IN_TREE")) return EINA_FALSE;
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c:38:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EFL_RUN_IN_TREE")) return EINA_FALSE;
data/efl-1.25.1/src/static_libs/buildsystem/buildsystem_meson.c:48:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EFL_RUN_IN_TREE")) return EINA_FALSE;
data/efl-1.25.1/src/static_libs/draw/draw_main_neon.c:220:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("EVAS_CPU_NO_NEON")) return; // compat with evas env vars
data/efl-1.25.1/src/tests/ecore/ecore_suite.c:65:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (eina_streq(getenv("CK_FORK"), "no")) return;
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:43:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   char *realpath;
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:50:11:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   return realpath;
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:57:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   char *realpath;
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:65:11:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   return realpath;
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:398:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   src_dir = getenv("PATH");
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_imf.c:41:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!getenv("DISPLAY")) return EINA_TRUE;
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_imf.c:88:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             if (!getenv("DISPLAY")) continue;
data/efl-1.25.1/src/tests/ecore/efl_app_test_env.c:103:52:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   ck_assert_str_eq(efl_core_env_get(env, "PATH"), getenv("PATH"));
data/efl-1.25.1/src/tests/ecore/efl_app_test_env.c:105:57:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   ck_assert_str_eq(efl_core_env_get(env_fork, "PATH"), getenv("PATH"));
data/efl-1.25.1/src/tests/ecore/efl_app_test_env.c:117:52:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   ck_assert_str_eq(efl_core_env_get(env, "PATH"), getenv("PATH"));
data/efl-1.25.1/src/tests/ecore/efl_app_test_env.c:120:52:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   ck_assert_str_eq(efl_core_env_get(env, "PATH"), getenv("PATH"));
data/efl-1.25.1/src/tests/ecore/efl_app_test_promise.c:815:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c:327:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *xdg_runtime_dir = getenv("XDG_RUNTIME_DIR");
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c:337:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *xdg_runtime_dir = getenv("XDG_RUNTIME_DIR");
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c:338:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *homedir = getenv("HOME");
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c:350:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *xdg_runtime_dir = getenv("XDG_RUNTIME_DIR");
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c:351:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *homedir = getenv("HOME");
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c:352:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *tmp = getenv("TMPDIR");
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:1188:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("EFL_TEST_ECORE_CON_IPV6"))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_display.c:184:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("E_START"))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_display.c:192:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("E_START"))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_display.c:291:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((!getenv("WAYLAND_DISPLAY")) && (getenv("XDG_RUNTIME_DIR")))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_display.c:291:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((!getenv("WAYLAND_DISPLAY")) && (getenv("XDG_RUNTIME_DIR")))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_display.c:300:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   else if (getenv("WAYLAND_DISPLAY"))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_display.c:314:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!getenv("E_START"))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_ecore_wl2.c:19:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("WAYLAND_DISPLAY") && (getenv("E_START")))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_ecore_wl2.c:19:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("WAYLAND_DISPLAY") && (getenv("E_START")))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_input.c:287:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("WAYLAND_DISPLAY"))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_output.c:28:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("WAYLAND_DISPLAY"))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_window.c:962:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("WAYLAND_DISPLAY"))
data/efl-1.25.1/src/tests/ecore_wl2/ecore_wl2_test_window.c:968:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("E_START"))
data/efl-1.25.1/src/tests/edje/edje_test_features.c:194:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   filename = realpath(test_layout_get("test_color_class.edj"), NULL);
data/efl-1.25.1/src/tests/efl_check.h:179:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        res = getenv("CK_FORK");
data/efl-1.25.1/src/tests/efl_check.h:197:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *lc = getenv("TIMING_ENABLED");
data/efl-1.25.1/src/tests/efl_check.h:227:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *env = getenv("TIME_DIFF_THRESHOLD");
data/efl-1.25.1/src/tests/eina/eina_test_debug.c:24:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!eina_streq(getenv("CK_FORK"), "no"))
data/efl-1.25.1/src/tests/eina/eina_test_hash.c:277:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(seed);
data/efl-1.25.1/src/tests/eina/eina_test_hash.c:315:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/tests/eina/eina_test_hash.c:355:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(seed);
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:176:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(time(NULL));
data/efl-1.25.1/src/tests/elementary/elm_code_file_test_load.c:25:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   ck_assert_ptr_ne(realpath(path, real), NULL);
data/efl-1.25.1/src/tests/elementary/elm_code_test_basic.c:40:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   ck_assert_ptr_ne(realpath(path, realpath1), NULL);
data/efl-1.25.1/src/tests/elementary/elm_code_test_basic.c:41:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   ck_assert_ptr_ne(realpath(elm_code_file_path_get(code->file), realpath2), NULL);
data/efl-1.25.1/src/tests/elementary/elm_test_glview.c:53:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("TESTS_GL_DISABLED"))
data/efl-1.25.1/src/tests/elementary/suite_helpers.c:320:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!getenv("ELM_ENGINE"))
data/efl-1.25.1/src/tests/elementary/suite_helpers.c:322:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (eina_streq(getenv("ELM_ENGINE"), "buffer"))
data/efl-1.25.1/src/tests/eo/suite/eo_test_general.c:1534:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (!eina_streq(getenv("CK_FORK"), "no"))
data/efl-1.25.1/src/tests/evas/evas_test_evasgl.c:515:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("DISPLAY"))
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:37:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:50:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:58:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:71:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:79:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:95:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV1");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:100:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV2");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:108:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV1");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:114:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV2");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:130:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV2");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:135:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV1");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:143:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV1");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:149:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV2");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:162:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:167:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   val = getenv("EVIL_TEST_ENV");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:258:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   res = realpath(filename, buf);
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:269:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   res = realpath(filename, buf);
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:280:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   res = realpath(filename, buf);
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:291:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
   res = realpath(filename, buf);
data/efl-1.25.1/doc/previews/preview_text_filter.c:82:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (argc >= 6) fontsize = atoi(argv[5]);
data/efl-1.25.1/doc/widgets/widget_preview_combobox.c:12:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/doc/widgets/widget_preview_index.c:31:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char buf[32];
data/efl-1.25.1/doc/widgets/widget_preview_list.c:41:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char buf[32];
data/efl-1.25.1/doc/widgets/widget_preview_map.c:29:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   w = atoi(argv[1]);
data/efl-1.25.1/doc/widgets/widget_preview_map.c:30:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   h = atoi(argv[2]);
data/efl-1.25.1/doc/widgets/widget_preview_tmpl_head.c:15:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   w = atoi(argv[1]);
data/efl-1.25.1/doc/widgets/widget_preview_tmpl_head.c:16:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   h = atoi(argv[2]);
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:38:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[128];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:52:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[128];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:66:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[128];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:80:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[128];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:94:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[128];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:111:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[128];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_convert.c:132:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[128];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_crc_hash.c:48:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_key[key_size];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_crc_hash.c:65:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_key[key_size];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_crc_hash.c:82:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_key[key_size];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_crc_hash.c:98:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_key[key_size];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_crc_hash.c:114:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_key[key_size];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_crc_hash.c:131:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_key[key_size];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_crc_hash.c:164:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_key[key_size];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_sort.c:57:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[10];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_sort.c:85:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[10];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_sort.c:112:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[10];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_sort.c:140:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[10];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_sort.c:163:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[10];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_sort.c:186:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[10];
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:50:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char build[64] = "string_";
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:61:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           char build[64] = "string_";
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:84:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char build[64] = "string_";
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:95:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           char build[64] = "string_";
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:114:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char build[64] = "string_";
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:125:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           char build[64] = "string_";
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:146:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char build[64] = "string_";
data/efl-1.25.1/src/benchmarks/eina/eina_bench_stringshare.c:157:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           char build[64] = "string_";
data/efl-1.25.1/src/benchmarks/elementary/collection.c:142:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             items = atoi(part);
data/efl-1.25.1/src/benchmarks/elementary/focus_widget_tree.c:264:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   focus_test1(atoi(argv[1]));
data/efl-1.25.1/src/benchmarks/evas/evas_bench_loader.c:12:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char filename[PATH_MAX];
data/efl-1.25.1/src/benchmarks/evas/evas_bench_saver.c:15:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char filename[PATH_MAX];
data/efl-1.25.1/src/bin/ecore_con/efl_net_proxy_helper.c:131:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   int id = atoi(cmd + 2);
data/efl-1.25.1/src/bin/ecore_con/efl_net_proxy_helper.c:230:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char inbuf[8192];
data/efl-1.25.1/src/bin/ecore_evas/eetpack.c:143:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                       quality = atoi(mode);
data/efl-1.25.1/src/bin/edje/edje_cc.c:148:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char rpath[PATH_MAX], rpath2[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc.c:272:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             min_quality = atoi(argv[i]);
data/efl-1.25.1/src/bin/edje/edje_cc.c:279:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             max_quality = atoi(argv[i]);
data/efl-1.25.1/src/bin/edje/edje_cc.c:378:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy(suffix, ".edj");
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:1885:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(copy, name, strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:1923:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(copy, name, strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:2761:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(filename, O_RDONLY | O_BINARY, S_IRUSR | S_IWUSR);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:2764:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[PATH_MAX], *dir;
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:2769:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
             fd = open(path, O_RDONLY | O_BINARY, S_IRUSR | S_IWUSR);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:5751:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[PATH_MAX], *dir;
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:8105:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(c, color, sizeof(Edje_Map_Color));
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13587:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13688:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(copy, name, strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13762:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(def_name, "program_%X", pc->programs.total_count);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:14452:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(copy, name, strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:589:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024], *p;
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:672:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024], *p;
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:800:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[EINA_PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:893:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[EINA_PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:894:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf2[EINA_PATH_MAX + EINA_PATH_MAX + 128];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1001:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hint[1024] = "";
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1087:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX], buf2[EINA_PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1256:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1296:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1532:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1602:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char snd_path[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1603:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sndid_str[15];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1716:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[EINA_PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1720:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mo_path[PATH_MAX] = {0};
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1721:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char moid_str[50];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1829:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[EINA_PATH_MAX + PATH_MAX + PATH_MAX + 128];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1832:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char mo_path[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1833:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char po_path[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1864:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                 memcpy(mw2, mw, sizeof(Mo_Write));
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1898:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1899:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char id_str[30];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2012:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2149:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2151:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(sc->tmpo, "rb");
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2334:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char embryo_cc_path[PATH_MAX] = "";
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2335:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char inc_path[PATH_MAX] = "";
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2372:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[EINA_PATH_MAX + PATH_MAX + PATH_MAX + 128];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2418:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&((data->buf)[data->size]), chunk_buf, chunk_size);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2435:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2469:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:3540:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char buf[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:3801:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(tmp, alias, ap - alias);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:4043:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(de, de_last, sizeof(Edje_Image_Directory_Entry));
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:4116:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(key, ":\"");
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:4312:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[12];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:4334:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen(depfile, "ab");
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:4344:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen(watchfile, "ab");
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:4420:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char token[2][1024];
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:4512:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[3];
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:84:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char file_buf[4096];
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:202:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = { 0, };
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:317:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:386:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char *pp, fl[4096];
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:402:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(tmpstr, p, l);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:580:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(tmp,
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:634:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(hierarchy,
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1026:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096 + 4096 + 4096], buf2[4096];
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1127:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char win_buf[4096];
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1150:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(file_in, O_RDONLY | O_BINARY, S_IRUSR | S_IWUSR);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1397:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *str, buf[4096];
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1548:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1666:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1677:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   (*val) = atoi(buf);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1761:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1879:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/edje/edje_cc_script.c:240:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = { 0, };
data/efl-1.25.1/src/bin/edje/edje_cc_sources.c:53:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[16 * 1024], *dir = NULL;
data/efl-1.25.1/src/bin/edje/edje_cc_sources.c:59:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(fil, "rb");
data/efl-1.25.1/src/bin/edje/edje_codegen.c:391:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   header_fd = fopen(header, "wb");
data/efl-1.25.1/src/bin/edje/edje_codegen.c:395:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   source_fd = fopen(source, "wb");
data/efl-1.25.1/src/bin/edje/edje_codegen.c:423:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/bin/edje/edje_codegen.c:446:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/bin/edje/edje_codegen.c:465:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/bin/edje/edje_codegen.c:481:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_codegen.c:527:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_codegen.c:588:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_codegen.c:667:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/bin/edje/edje_codegen.c:748:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *d, *d_end, buf[256];
data/efl-1.25.1/src/bin/edje/edje_codegen.c:865:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/bin/edje/edje_codegen.c:895:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/bin/edje/edje_convert.c:75:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(edf->image_dir->entries + de->id,
data/efl-1.25.1/src/bin/edje/edje_convert.c:98:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(edf->image_dir->sets + ds->id,
data/efl-1.25.1/src/bin/edje/edje_convert_main.c:48:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_convert_main.c:57:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(buf, "%i");
data/efl-1.25.1/src/bin/edje/edje_convert_main.c:60:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[1024];
data/efl-1.25.1/src/bin/edje/edje_convert_main.c:78:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_convert_main.c:87:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(buf, "%s");
data/efl-1.25.1/src/bin/edje/edje_convert_main.c:90:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[1024];
data/efl-1.25.1/src/bin/edje/edje_convert_main.c:91:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char id[1024];
data/efl-1.25.1/src/bin/edje/edje_convert_main.c:165:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_decc.c:313:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char buf[4096];
data/efl-1.25.1/src/bin/edje/edje_decc.c:314:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char out[4096];
data/efl-1.25.1/src/bin/edje/edje_decc.c:361:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char out[4096];
data/efl-1.25.1/src/bin/edje/edje_decc.c:382:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen(out, "wb");
data/efl-1.25.1/src/bin/edje/edje_decc.c:405:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char out[4096];
data/efl-1.25.1/src/bin/edje/edje_decc.c:433:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                  if (!(f = fopen(out, "wb")))
data/efl-1.25.1/src/bin/edje/edje_decc.c:447:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char out[4096];
data/efl-1.25.1/src/bin/edje/edje_decc.c:460:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
           if ((f = fopen(out, "wb")))
data/efl-1.25.1/src/bin/edje/edje_decc.c:491:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char out[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_decc.c:492:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char out1[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_decc.c:522:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                  f = fopen(out1, "wb");
data/efl-1.25.1/src/bin/edje/edje_decc.c:537:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char out[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_decc.c:538:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char out1[PATH_MAX];
data/efl-1.25.1/src/bin/edje/edje_decc.c:568:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                  f = fopen(out1, "wb");
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:163:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
     strcat(buf, "GET");
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:168:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(buf, "SET");
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:174:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(buf, "STATE");
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:180:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(buf, "CONSTRUCTOR");
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:422:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[128];
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:641:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   if (!mode) mode = (char *)mode_choices[0];
data/efl-1.25.1/src/bin/edje/edje_inspector.c:804:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *d, *d_end, buf[256];
data/efl-1.25.1/src/bin/edje/edje_inspector.c:935:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char state[512], *delim;
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1439:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[128];
data/efl-1.25.1/src/bin/edje/edje_inspector.c:1658:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   if (!mode) mode = (char *)mode_choices[0];
data/efl-1.25.1/src/bin/edje/edje_multisense_convert.c:115:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(snd_path, ".flac");
data/efl-1.25.1/src/bin/edje/edje_multisense_convert.c:226:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(snd_path, ".ogg");
data/efl-1.25.1/src/bin/edje/edje_multisense_convert.c:227:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fout = fopen(snd_path, "wb");
data/efl-1.25.1/src/bin/edje/edje_pick.c:522:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&o->external_dir->entries[base], edf->external_dir->entries,
data/efl-1.25.1/src/bin/edje/edje_pick.c:601:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(ce_new, ce_cor, sizeof(*ce_new));
data/efl-1.25.1/src/bin/edje/edje_pick.c:617:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_pick.c:649:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ce_out, ce_cor, sizeof(*ce_out));                                                          \
data/efl-1.25.1/src/bin/edje/edje_pick.c:729:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(ce_out, ce, sizeof(*ce_out));
data/efl-1.25.1/src/bin/edje/edje_pick.c:783:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(ce_out, ce, sizeof(*ce_out));
data/efl-1.25.1/src/bin/edje/edje_pick.c:901:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(&o->image_dir->entries[o->image_dir->entries_count - 1],
data/efl-1.25.1/src/bin/edje/edje_pick.c:934:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(&o->image_dir->sets[o->image_dir->sets_count - 1],
data/efl-1.25.1/src/bin/edje/edje_pick.c:971:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(&o->image_dir->vectors[o->image_dir->vectors_count - 1],
data/efl-1.25.1/src/bin/edje/edje_pick.c:986:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_pick.c:1051:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_pick.c:1115:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_pick.c:1163:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_pick.c:1196:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_pick.c:1227:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_pick.c:1325:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_pick.c:1613:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p, sample, sizeof(Edje_Sound_Sample));
data/efl-1.25.1/src/bin/edje/edje_pick.c:1630:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                 memcpy(t, tone, sizeof(Edje_Sound_Tone));
data/efl-1.25.1/src/bin/edje/edje_pick.c:1655:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p, sample, sizeof(Edje_Vibration_Sample));
data/efl-1.25.1/src/bin/edje/edje_pick.c:1679:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_player.c:26:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char  color[3];
data/efl-1.25.1/src/bin/edje/edje_player.c:48:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/edje/edje_player.c:126:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   msg.val = atoi(arg);
data/efl-1.25.1/src/bin/edje/edje_player.c:145:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   count = atoi(arg);
data/efl-1.25.1/src/bin/edje/edje_player.c:171:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   count = atoi(arg);
data/efl-1.25.1/src/bin/edje/edje_player.c:182:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        msg->val[i] = atoi(extra_args);
data/efl-1.25.1/src/bin/edje/edje_player.c:197:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   count = atoi(arg);
data/efl-1.25.1/src/bin/edje/edje_player.c:230:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   msg.val = atoi(extra_args);
data/efl-1.25.1/src/bin/edje/edje_player.c:269:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   count = atoi(extra_args);
data/efl-1.25.1/src/bin/edje/edje_player.c:281:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        msg->val[i] = atoi(val);
data/efl-1.25.1/src/bin/edje/edje_player.c:305:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   count = atoi(extra_args);
data/efl-1.25.1/src/bin/edje/edje_player.c:343:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   id = atoi(id_str);
data/efl-1.25.1/src/bin/edje/edje_player.c:528:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024], *p;
data/efl-1.25.1/src/bin/edje/edje_player.c:606:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/bin/edje/edje_player.c:807:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024] = "";
data/efl-1.25.1/src/bin/edje/epp/cppexp.c:347:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   char                token_buffer[MAX_LONG_TYPE_SIZE /
data/efl-1.25.1/src/bin/edje/epp/cppexp.c:1067:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy((char *)new_stack, (char *)stack, old_size);
data/efl-1.25.1/src/bin/edje/epp/cpphash.c:183:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(hp->name, name, len);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:492:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char       is_idchar[256];
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:495:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char       is_idstart[256];
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:498:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char       is_hor_space[256];
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:501:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char is_space[256];
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:563:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf((char *)CPP_PWRITTEN(pfile), "\\%03o", c);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:619:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat((char *)buf, " 1");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:757:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&pfile->deps_buffer[pfile->deps_size], string, size);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:796:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(name, p, q - p);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:1582:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&defn->args.argnames[i], temp->name, temp->length);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:1689:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg, symname, sym_length);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:1834:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	     memcpy(msg + 1, mdef.symnam, mdef.symlen);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:1835:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	     strcpy((msg + mdef.symlen + 1), "' redefined");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2146:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf((char *)CPP_PWRITTEN(pfile), "%d ", (int)line);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2351:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(bufx, "%d", true_indepth - 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2387:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(bufx, "%d", hp->value.ival);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2399:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	   sprintf(bufx, "%d", (int)line);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2412:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	   sprintf(bufx, "\"%02d:%02d:%02d\"", timebuf->tm_hour,
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2491:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                directive[2048];
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2534:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(directive, " __TIME__ \"%02d:%02d:%02d\"\n",
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2540:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(directive, " __STDC__ 1");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2897:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				 sprintf((char *)CPP_PWRITTEN(pfile), "\\%03o",
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2970:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy(xbuf + totlen, ARG_BASE + arg->stringified,
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3013:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy(xbuf + totlen, p1, l1 - p1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3026:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy(xbuf + totlen, expanded, arg->expand_length);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3387:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		       strcat(fname, ".h");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3632:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(hp->name, name, len);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3762:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   new_lineno = atoi((char *)(pfile->token_buffer + old_written)) - 1;
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3847:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	     memcpy(hp->value.cpval, fname, fname_length);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3915:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(copy, buf, length);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3937:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(copy, buf, length);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:4178:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	     memcpy(control_macro, ident, ident_length + 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5115:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		     memcpy(xbuf, CPP_PWRITTEN(pfile), xbuf_len + 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5332:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((char *)&i->inode, (char *)&sb.st_ino, sizeof(sb.st_ino));
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5419:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(name, "rb");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5421:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(name, "rtb");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5505:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		  return open(map->map_to, O_RDONLY | O_BINARY, 0666);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5523:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return open(filename, O_RDONLY | O_BINARY, 0666);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5535:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s, filename, p - filename);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5544:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
           return open(map->map_to, O_RDONLY | O_BINARY, 0666);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5548:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   return open(filename, O_RDONLY | O_BINARY, 0666);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5558:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   return open(filename, O_RDONLY | O_BINARY, 0666);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5914:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy((char *)&include_defaults[num_dirs],
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6023:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	     int                 fd = open(pend->arg, O_RDONLY | O_BINARY, 0666);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6046:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   else if ((f = open(fname, O_RDONLY | O_BINARY, 0666)) < 0)
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6086:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	     memcpy(output_file, spec, s - spec);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6152:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	     strcpy(q, ".o");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6168:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	     int                 fd = open(pend->arg, O_RDONLY | O_BINARY, 0666);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6305:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       dirtmp->fname = (char *)xmalloc(strlen(argv[i + 1]) + 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6345:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       dirtmp->fname = (char *)xmalloc(strlen(argv[i + 1])
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6388:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       dirtmp->fname = (char *)xmalloc(strlen(argv[i + 1])
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6797:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	     else if (!(deps_stream = fopen(opts->deps_file, deps_mode)))
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:7115:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(temp->name, (char *)(pfile->token_buffer + name_written),
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:7518:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(options.watchfile, "ab");
data/efl-1.25.1/src/bin/edje/epp/cpplib.h:265:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  do { memcpy ((PFILE)->limit, STR, (N)); (PFILE)->limit += (N); } while(0)
data/efl-1.25.1/src/bin/edje/epp/cpplib.h:590:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern unsigned char is_idchar[256];
data/efl-1.25.1/src/bin/eet/eet_main.c:175:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen(out, "wb");
data/efl-1.25.1/src/bin/eet/eet_main.c:219:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen(out, "wb");
data/efl-1.25.1/src/bin/eet/eet_main.c:259:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(in, "rb");
data/efl-1.25.1/src/bin/eet/eet_main.c:318:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(in, "rb");
data/efl-1.25.1/src/bin/eet/eet_main.c:533:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          do_eet_insert(argv[2], argv[3], argv[4], atoi(argv[5]), argv[6]);
data/efl-1.25.1/src/bin/eet/eet_main.c:535:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          do_eet_insert(argv[2], argv[3], argv[4], atoi(argv[5]), NULL);
data/efl-1.25.1/src/bin/eet/eet_main.c:540:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          do_eet_encode(argv[2], argv[3], argv[4], atoi(argv[5]), argv[6]);
data/efl-1.25.1/src/bin/eet/eet_main.c:542:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          do_eet_encode(argv[2], argv[3], argv[4], atoi(argv[5]), NULL);
data/efl-1.25.1/src/bin/eeze/eeze_scanner/eeze_scanner.c:240:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(devpath, O_RDONLY | O_BINARY);
data/efl-1.25.1/src/bin/efl/efl_debug.c:38:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pval, _buf, sz); \
data/efl-1.25.1/src/bin/efl/efl_debug.c:126:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int freq = SWAP_32(atoi(my_argv[3]));
data/efl-1.25.1/src/bin/efl/efl_debug.c:141:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[4096];
data/efl-1.25.1/src/bin/efl/efl_debug.c:142:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int pid = atoi(my_argv[2]);
data/efl-1.25.1/src/bin/efl/efl_debug.c:145:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        _evlog_file = fopen(path, "wb");
data/efl-1.25.1/src/bin/efl/efl_debug.c:236:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int pid = atoi(my_argv[2]);
data/efl-1.25.1/src/bin/efl/efl_debugd.c:72:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(_buf, pval, sz); \
data/efl-1.25.1/src/bin/efl/efl_debugd.c:78:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pval, _buf, sz); \
data/efl-1.25.1/src/bin/efl/efl_debugd.c:421:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buffer, slice.mem, size);
data/efl-1.25.1/src/bin/efl/efl_debugd.c:538:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[512];
data/efl-1.25.1/src/bin/efl/efl_debugd.c:608:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char address[256];
data/efl-1.25.1/src/bin/efl/efl_debugd.c:627:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(address, "127.0.0.1:%d", REMOTE_SERVER_PORT);
data/efl-1.25.1/src/bin/efreet/efreet_desktop_cache_create.c:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreet_desktop_cache_create.c:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreet_desktop_cache_create.c:231:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    lockfd = open(file, O_CREAT | O_BINARY | O_RDWR, S_IRUSR | S_IWUSR);
data/efl-1.25.1/src/bin/efreet/efreet_desktop_cache_create.c:285:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreet_desktop_cache_create.c:345:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreet_desktop_cache_create.c:456:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char file_id[PATH_MAX] = { '\0' };
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:238:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX], *tdir, *sep;
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:262:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:641:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(t, tmp, len);
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:670:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(t, tmp, len);
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:705:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:769:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, entry->path, entry->path_length);
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:770:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf + entry->path_length, "/index.theme", sizeof("/index.theme"));
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:784:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:789:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    lockfd = open(file, O_CREAT | O_BINARY | O_RDWR, S_IRUSR | S_IWUSR);
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:837:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:47:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char file[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:52:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   lockfd = open(file, O_CREAT | O_BINARY | O_RDWR, S_IRUSR | S_IWUSR);
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:95:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096], buf2[4096], buf3[4096], *p, *p2;
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:97:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *f = fopen(file, "r");
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:154:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096], buf2[4096], buf3[4096], *p, *p2;
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:156:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *f = fopen(file, "r");
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:231:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX + 128];
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:246:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(buf, "wb");
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:379:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreetd.c:35:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[PATH_MAX + 128], buf[PATH_MAX];
data/efl-1.25.1/src/bin/efreet/efreetd_cache.c:786:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(eina_strbuf_string_get(buf), "wb");
data/efl-1.25.1/src/bin/efreet/efreetd_ipc.c:63:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(str, data, size);
data/efl-1.25.1/src/bin/efreet/efreetd_ipc.c:96:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(p, p0, p1 - p0);
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:114:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096], func[4096], *f1 = NULL, *f2 = NULL;
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:157:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:215:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             *file_line = atoi(s);
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:237:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char local[PATH_MAX + sizeof(" 0x1234567890123456789 0x1234567890123456789\n")];
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:356:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/eldbus/source_client.c:8:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buffer[4028];
data/efl-1.25.1/src/bin/eldbus/utils.c:15:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   xml_handler = fopen(file_name, "rt");
data/efl-1.25.1/src/bin/eldbus/utils.c:47:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   file_handler = fopen(filename, "wt");
data/efl-1.25.1/src/bin/elementary/config.c:2217:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *theme_name, *sep[20];
data/efl-1.25.1/src/bin/elementary/config.c:2860:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char str[16];
data/efl-1.25.1/src/bin/elementary/config.c:2974:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/config.c:3159:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/config.c:3242:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/config.c:4460:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (finger_size_set) elm_config_finger_size_set(atoi(finger_size_set));
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:303:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   header_fd = fopen(header, "w");
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:307:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   source_fd = fopen(source, "w");
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:335:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:358:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:378:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *str[3];  /* *klas, *style, *group */
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:379:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *token, *_group, buf[512];
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:420:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:492:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *d, *d_end, buf[256];
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:571:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:601:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc.c:88:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char rpath[PATH_MAX], rpath2[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc.c:167:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy(suffix, ".epb");
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:62:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char file_buf[4096];
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:190:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:258:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char *pp, fl[4096];
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:280:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(tmpstr, p, l);
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:646:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(file_in, O_RDONLY | O_BINARY, S_IRUSR | S_IWUSR);
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:812:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *str, buf[4096];
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:903:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char errbuf[1024];
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:935:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:1053:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:1064:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   (*val) = atoi(buf);
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:1148:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:1266:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/elementary/perf.c:240:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             eina_array_push(tests_to_do, (void *)(uintptr_t)atoi(argv[i]));
data/efl-1.25.1/src/bin/elementary/quicklaunch.c:184:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/quicklaunch.c:249:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(socket_unix.sun_path, buf, len);
data/efl-1.25.1/src/bin/elementary/run.c:35:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/run.c:127:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char buf2[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/run.c:198:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        strcpy((char *)pos, sargv[i]);
data/efl-1.25.1/src/bin/elementary/run.c:208:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        strcpy((char *)pos, environ[i]);
data/efl-1.25.1/src/bin/elementary/test.c:519:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_3d.c:46:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_access.c:21:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_access.c:29:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_access.c:61:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_access.c:230:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_access.c:336:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_anim.c:58:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_bg.c:34:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buff[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_bg.c:99:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_bg.c:172:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_bg.c:333:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_bg.c:409:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_box.c:114:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_box.c:119:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_box.c:134:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_box.c:257:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_box.c:349:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_box.c:576:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_bubble.c:61:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_bubble.c:89:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_bubble.c:94:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_bubble.c:109:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_button.c:10:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[16];
data/efl-1.25.1/src/bin/elementary/test_button.c:27:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *btn_label[NUM_LABEL] =
data/efl-1.25.1/src/bin/elementary/test_button.c:53:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_calendar.c:93:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_calendar.c:98:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_calendar.c:155:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char info[1024];
data/efl-1.25.1/src/bin/elementary/test_calendar.c:189:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char info[1024];
data/efl-1.25.1/src/bin/elementary/test_calendar.c:215:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/bin/elementary/test_check.c:36:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_check.c:177:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_clock.c:93:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_clock.c:98:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_code.c:241:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[250];
data/efl-1.25.1/src/bin/elementary/test_code.c:243:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf, "line %d", ++line);
data/efl-1.25.1/src/bin/elementary/test_combobox.c:55:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_combobox.c:63:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_combobox.c:84:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_config.c:33:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char  *available_profiles[MAX_PROFILES];
data/efl-1.25.1/src/bin/elementary/test_config.c:74:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_config.c:88:26:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
             if (i >= 1) strcat(buf, ", ");
data/efl-1.25.1/src/bin/elementary/test_config.c:92:46:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        if (strlen(buf) < (sizeof(buf) - 5)) strcat(buf, "</b>");
data/efl-1.25.1/src/bin/elementary/test_config.c:372:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_config.c:428:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_config.c:543:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[255];
data/efl-1.25.1/src/bin/elementary/test_config.c:567:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   font_size = atoi(font_size_temp);
data/efl-1.25.1/src/bin/elementary/test_ctxpopup.c:259:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ctxpopup.c:478:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[16];
data/efl-1.25.1/src/bin/elementary/test_cursor.c:24:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_cursor.c:93:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_cursor.c:195:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_cursor.c:198:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *img[9] =
data/efl-1.25.1/src/bin/elementary/test_cursor.c:311:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_cursor.c:417:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_dayselector.c:8:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_disable.c:113:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_diskselector.c:87:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_diskselector.c:135:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_diskselector.c:140:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_diskselector.c:214:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_diskselector.c:224:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char date[3];
data/efl-1.25.1/src/bin/elementary/test_dnd.c:9:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *img[9] =
data/efl-1.25.1/src/bin/elementary/test_dnd.c:755:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_dnd.c:829:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_dnd.c:894:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_dnd.c:1065:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_dnd.c:1289:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dd[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_dnd.c:1316:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_mapping.c:47:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:43:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             if (v) color[i] = atoi(v);
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:47:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(new_values, "%d %d %d %d",color[0], color[1], color[2], color[3]);
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:51:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(new_type, "FillColor");
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:56:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(new_type, "StrokeColor");
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:70:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(new_type, "StrokeWidth");
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:71:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(new_values, "%f", width);
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:93:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(new_type, "TrPosition");
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:94:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(new_values, "%f %f",value[0], value[1]);
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:101:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(new_type, "TrScale");
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:102:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(new_values, "%f %f",value[0], value[1]);
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:108:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(new_values, "%f",value[0]);
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:109:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(new_type, "TrRotation");
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:148:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char new_path[255], new_type[255], new_values[255];
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:151:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[765];
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:184:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char item_text[255];
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:254:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char color_text[4][2] = { "R", "G", "B", "A" };
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:280:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char text[2][2];
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:405:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[255];
data/efl-1.25.1/src/bin/elementary/test_efl_gfx_vg_value_provider.c:682:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[255];
data/efl-1.25.1/src/bin/elementary/test_efl_ui_text.c:97:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *wrap_mode[4];
data/efl-1.25.1/src/bin/elementary/test_efl_ui_vg_animation.c:177:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[255];
data/efl-1.25.1/src/bin/elementary/test_efl_ui_vg_animation.c:328:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[255];
data/efl-1.25.1/src/bin/elementary/test_eio.c:163:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_entry.c:151:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/bin/elementary/test_entry.c:803:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_entry.c:1832:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_entry.c:2250:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/elementary/test_entry.c:2267:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/elementary/test_entry_anchor.c:117:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_evas_map.c:55:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_evas_mask.c:15:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX], bufimg[PATH_MAX], buftxt[256];
data/efl-1.25.1/src/bin/elementary/test_evas_mask.c:35:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buftxt, "# %d #", num);
data/efl-1.25.1/src/bin/elementary/test_evas_mask.c:46:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/bin/elementary/test_evas_mask.c:47:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf, "Genlist item %u", (unsigned)(uintptr_t)data);
data/efl-1.25.1/src/bin/elementary/test_evas_mask.c:123:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_evas_snapshot.c:89:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/bin/elementary/test_evas_snapshot.c:94:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf, "tonumber(%d)", (int) elm_slider_value_get(ev->object));
data/efl-1.25.1/src/bin/elementary/test_events.c:50:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[1024];
data/efl-1.25.1/src/bin/elementary/test_events.c:106:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_external.c:11:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_external.c:31:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_external.c:51:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_external.c:190:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_external.c:214:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_external.c:234:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_external.c:288:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_factory.c:40:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[32];
data/efl-1.25.1/src/bin/elementary/test_fileselector.c:73:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char error_msg[256];
data/efl-1.25.1/src/bin/elementary/test_fileselector.c:524:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs/a_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector.c:526:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs/k_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector.c:528:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs/m_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector.c:533:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs/a_subdir/d_sub_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector.c:535:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs/a_subdir/j_sub_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector_button.c:61:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_fileselector_button.c:66:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_fileselector_button.c:77:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs_bt/a_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector_button.c:79:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs_bt/k_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector_button.c:81:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs_bt/m_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector_button.c:86:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs_bt/a_subdir/d_sub_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector_button.c:88:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs_bt/a_subdir/j_sub_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector_entry.c:61:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_fileselector_entry.c:66:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_fileselector_entry.c:79:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs_en/a_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector_entry.c:81:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs_en/k_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector_entry.c:83:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs_en/m_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector_entry.c:88:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs_en/a_subdir/d_sub_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_fileselector_entry.c:90:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_fs_en/a_subdir/j_sub_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_flip.c:87:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_flip.c:126:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_flip.c:273:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_flip.c:443:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_flip.c:587:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_flip.c:699:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_flip_page.c:838:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_flip_page_eo.c:822:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_flipselector.c:82:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[8];
data/efl-1.25.1/src/bin/elementary/test_floating.c:16:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_floating.c:23:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_focus.c:316:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_focus.c:578:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_focus.c:820:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char win_focus_theme[PATH_MAX] = { 0 };
data/efl-1.25.1/src/bin/elementary/test_focus.c:821:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char item_name[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_focus.c:873:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(item_name, "Item %d", i);
data/efl-1.25.1/src/bin/elementary/test_focus.c:931:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_focus.c:1088:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/bin/elementary/test_focus.c:1108:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_focus_style.c:28:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char win_focus_theme[PATH_MAX] = { 0 };
data/efl-1.25.1/src/bin/elementary/test_focus_style.c:123:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char win_focus_theme[PATH_MAX] = {0}, buf[PATH_MAX] = {0};
data/efl-1.25.1/src/bin/elementary/test_focus_style.c:185:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char win_focus_theme[PATH_MAX] = { 0 };
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:128:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:133:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:138:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *img[9] =
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:151:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *cur[4] =
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:272:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:365:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:704:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:731:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:748:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:780:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:796:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:970:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:1038:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:1306:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:1423:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:1489:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:1743:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:2036:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:2291:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:2378:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (pstr) w = atoi(pstr);
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:2380:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (pstr) h = atoi(pstr);
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:2390:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[8];
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:2411:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:117:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:122:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_genlist.c:145:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:155:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:238:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:501:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        bounce_max = atoi(getenv("ELM_TEST_AUTOBOUNCE"));
data/efl-1.25.1/src/bin/elementary/test_genlist.c:540:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:741:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:918:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:927:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:1083:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:1242:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256] = { 0 };
data/efl-1.25.1/src/bin/elementary/test_genlist.c:1258:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:1569:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:1577:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:1863:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:2264:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:2275:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:2996:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:3005:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:3167:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:3176:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:3269:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:4046:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:4332:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256] = { 0 };
data/efl-1.25.1/src/bin/elementary/test_genlist.c:4462:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:5200:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:5228:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[100];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:5613:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   *val = atoi(elm_entry_entry_get(obj));
data/efl-1.25.1/src/bin/elementary/test_genlist.c:5767:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:5783:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:5856:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:5867:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/bin/elementary/test_genlist.c:5896:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/bin/elementary/test_gesture_framework.c:61:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/elementary/test_gesture_framework.c:600:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/elementary/test_gesture_layer.c:290:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gesture_layer.c:362:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gesture_layer2.c:61:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/elementary/test_gesture_layer2.c:526:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/elementary/test_gesture_layer3.c:473:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gesture_layer3.c:560:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_gfx_filters.c:319:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/bin/elementary/test_gfx_filters.c:324:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf, "color(%d, %d, %d, %d)", r, g, b, a);
data/efl-1.25.1/src/bin/elementary/test_gfx_filters.c:396:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_glview.c:204:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(m, &tmp, sizeof tmp);
data/efl-1.25.1/src/bin/elementary/test_glview.c:240:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tmp, m, sizeof tmp);
data/efl-1.25.1/src/bin/elementary/test_glview.c:271:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(m, gld->proj, sizeof m);
data/efl-1.25.1/src/bin/elementary/test_glview.c:308:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(gld->proj, m, sizeof gld->proj);
data/efl-1.25.1/src/bin/elementary/test_glview_manygears.c:309:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(m, &tmp, sizeof tmp);
data/efl-1.25.1/src/bin/elementary/test_glview_manygears.c:349:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(m, t, sizeof(t));
data/efl-1.25.1/src/bin/elementary/test_glview_manygears.c:364:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(m, t, sizeof(t));
data/efl-1.25.1/src/bin/elementary/test_glview_manygears.c:420:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(m, tmp, sizeof(tmp));
data/efl-1.25.1/src/bin/elementary/test_glview_manygears.c:609:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[512] = {};
data/efl-1.25.1/src/bin/elementary/test_glview_manygears.c:839:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_grid.c:71:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_grid.c:76:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_hover.c:32:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_hover.c:107:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_hover.c:200:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_hoversel.c:80:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_hoversel.c:85:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_hoversel.c:151:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_icon.c:31:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_icon.c:56:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_icon.c:132:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_icon_animated.c:21:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_image.c:50:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_image.c:144:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_image.c:183:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_image.c:239:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096] = {0};
data/efl-1.25.1/src/bin/elementary/test_image.c:255:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096] = {0};
data/efl-1.25.1/src/bin/elementary/test_image.c:268:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096] = {0};
data/efl-1.25.1/src/bin/elementary/test_image.c:283:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096] = {0};
data/efl-1.25.1/src/bin/elementary/test_image.c:424:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_image.c:488:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = {0};
data/efl-1.25.1/src/bin/elementary/test_image.c:552:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = {0};
data/efl-1.25.1/src/bin/elementary/test_image.c:662:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_index.c:109:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_index.c:114:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_index.c:123:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_index.c:248:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[32];
data/efl-1.25.1/src/bin/elementary/test_index.c:312:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char letter[2];
data/efl-1.25.1/src/bin/elementary/test_index.c:463:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = {0, };
data/efl-1.25.1/src/bin/elementary/test_index.c:546:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[30];
data/efl-1.25.1/src/bin/elementary/test_index.c:575:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "Item #%d", i);
data/efl-1.25.1/src/bin/elementary/test_index.c:577:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", i);
data/efl-1.25.1/src/bin/elementary/test_inwin.c:45:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_inwin.c:50:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_label.c:430:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char status[0xFFF];
data/efl-1.25.1/src/bin/elementary/test_label.c:441:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(status,"Mode : ");
data/efl-1.25.1/src/bin/elementary/test_label.c:443:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(status,"MODE_NONE");
data/efl-1.25.1/src/bin/elementary/test_label.c:445:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(status,"MODE_HEIGHT");
data/efl-1.25.1/src/bin/elementary/test_label.c:447:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(status,"MODE_WIDTH");
data/efl-1.25.1/src/bin/elementary/test_label.c:449:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(status,"MODE_ALL");
data/efl-1.25.1/src/bin/elementary/test_label.c:451:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(status,"<br>");
data/efl-1.25.1/src/bin/elementary/test_label.c:452:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(status + strlen(status),"Max   : %d<br>",max);
data/efl-1.25.1/src/bin/elementary/test_label.c:453:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(status + strlen(status),"Min   : %d<br>",min);
data/efl-1.25.1/src/bin/elementary/test_label.c:454:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(status + strlen(status),"Step  : %d<br>",step);
data/efl-1.25.1/src/bin/elementary/test_label.c:455:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(status + strlen(status),"Array  : [ ");
data/efl-1.25.1/src/bin/elementary/test_label.c:459:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
           sprintf(status + strlen(status)," %d,",size_array[i]);
data/efl-1.25.1/src/bin/elementary/test_label.c:463:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(status + strlen(status)," ... ");
data/efl-1.25.1/src/bin/elementary/test_label.c:464:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(status + strlen(status)," ]");
data/efl-1.25.1/src/bin/elementary/test_label.c:466:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(status + strlen(status),"<br>");
data/efl-1.25.1/src/bin/elementary/test_label.c:577:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int size = atoi(elm_object_text_get(app_mem->entry[BUTTON_MEM_APPLY_MEM]));
data/efl-1.25.1/src/bin/elementary/test_label.c:589:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int font_size = atoi(elm_object_text_get(app_mem->entry[BUTTON_MEM_APPLY_FONT_SIZE]));
data/efl-1.25.1/src/bin/elementary/test_label.c:592:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char sfont_size[256] = {0};
data/efl-1.25.1/src/bin/elementary/test_label.c:593:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(sfont_size,"DEFAULT='font_size=%i'", font_size);
data/efl-1.25.1/src/bin/elementary/test_launcher.c:193:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_launcher.c:383:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_launcher.c:581:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_launcher.c:665:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/efl-1.25.1/src/bin/elementary/test_launcher.c:725:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_layout.c:47:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_layout.c:187:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_layout.c:192:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_list.c:230:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_list.c:235:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_list.c:301:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_list.c:457:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_list.c:601:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_list.c:718:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_list.c:734:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_list.c:891:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_list.c:1040:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_list.c:1057:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_list.c:1077:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_list.c:1097:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_list.c:1196:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_list.c:1438:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_list.c:1727:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_main_menu.c:46:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     enabled = !atoi(s);
data/efl-1.25.1/src/bin/elementary/test_map.c:12:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char file[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_map.c:80:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_map.c:839:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = { 0 };
data/efl-1.25.1/src/bin/elementary/test_menu.c:231:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_multi.c:101:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_multibuttonentry.c:11:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/bin/elementary/test_multibuttonentry.c:244:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_multibuttonentry.c:330:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe.c:11:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char img1[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe.c:12:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char img2[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe.c:13:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char img3[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe.c:14:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char img4[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe.c:15:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char img5[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe.c:16:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char img6[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe.c:17:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char img7[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe.c:235:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:14:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:22:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:133:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char img6[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:157:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char img7[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:181:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char img5[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:209:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:210:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char img4[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:249:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:250:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char img3[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:284:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:285:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char img2[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_naviframe_complex.c:313:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char img1[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_panel.c:97:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_panel/a_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_panel.c:99:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_panel/k_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_panel.c:101:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_panel/m_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_panel.c:106:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_panel/a_subdir/d_sub_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_panel.c:108:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/tmp/test_panel/a_subdir/j_sub_file.txt", "w");
data/efl-1.25.1/src/bin/elementary/test_panel.c:196:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = { 0 };
data/efl-1.25.1/src/bin/elementary/test_part_bg.c:44:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_part_bg.c:63:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_part_shadow.c:83:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_part_shadow.c:85:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char loops[32];
data/efl-1.25.1/src/bin/elementary/test_part_shadow.c:137:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(loops, "%f", (double) ELM_SCALE_SIZE(12));
data/efl-1.25.1/src/bin/elementary/test_photo.c:30:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_photo.c:32:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *img[9] =
data/efl-1.25.1/src/bin/elementary/test_photocam.c:298:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_photocam.c:802:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_popup.c:258:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_popup.c:307:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_popup.c:366:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_popup.c:417:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_popup.c:475:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_popup.c:480:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(str, "You have checked this popup %d times.", times);
data/efl-1.25.1/src/bin/elementary/test_popup.c:531:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_popup.c:622:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_prefs.c:71:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_progressbar.c:99:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/elementary/test_progressbar.c:112:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX], form[20];
data/efl-1.25.1/src/bin/elementary/test_radio.c:24:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_scroller.c:238:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_scroller.c:240:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *img[9] =
data/efl-1.25.1/src/bin/elementary/test_scroller.c:688:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        bounce->bounce_max = atoi(getenv("ELM_TEST_AUTOBOUNCE"));
data/efl-1.25.1/src/bin/elementary/test_scroller.c:766:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_scroller.c:780:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_scroller.c:794:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_scroller.c:919:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_segment_control.c:19:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_slider.c:176:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_store.c:89:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sort_id[7];
data/efl-1.25.1/src/bin/elementary/test_store.c:97:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   id = atoi(file);
data/efl-1.25.1/src/bin/elementary/test_store.c:127:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096], *p;
data/efl-1.25.1/src/bin/elementary/test_store.c:134:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(path, "rb");
data/efl-1.25.1/src/bin/elementary/test_thumb.c:11:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:22:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:30:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:38:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:60:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:104:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:210:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:314:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:418:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:522:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:630:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:734:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:838:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_toolbar.c:976:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_tooltip.c:22:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_tooltip.c:103:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_tooltip.c:115:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_tooltip.c:131:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_tooltip.c:147:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_tooltip.c:196:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/bin/elementary/test_tooltip.c:361:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_tooltip.c:376:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_tooltip.c:647:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_tooltip.c:648:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *img[9] =
data/efl-1.25.1/src/bin/elementary/test_transit.c:136:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_transit.c:350:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_transit.c:490:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_transit.c:539:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_transit_bezier.c:59:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/elementary/test_transit_bezier.c:215:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_box_stack.c:13:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_button.c:30:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_collection.c:104:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_image.c:32:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_image.c:150:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_image.c:176:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_image.c:224:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096] = {0};
data/efl-1.25.1/src/bin/elementary/test_ui_image.c:240:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096] = {0};
data/efl-1.25.1/src/bin/elementary/test_ui_image.c:253:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096] = {0};
data/efl-1.25.1/src/bin/elementary/test_ui_image.c:268:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096] = {0};
data/efl-1.25.1/src/bin/elementary/test_ui_image.c:443:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = {0};
data/efl-1.25.1/src/bin/elementary/test_ui_image.c:502:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = {0};
data/efl-1.25.1/src/bin/elementary/test_ui_items.c:12:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_pager.c:75:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_pager.c:700:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_pager_scroll.c:80:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_pager_scroll.c:900:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_panel.c:10:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = {0};
data/efl-1.25.1/src/bin/elementary/test_ui_popup.c:87:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_popup.c:361:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_popup.c:390:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_popup.c:414:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_popup.c:440:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_popup.c:466:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_popup.c:492:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_popup.c:1009:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_progressbar.c:150:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_spotlight.c:71:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_spotlight.c:854:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_spotlight.c:950:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_spotlight.c:1044:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_spotlight.c:1141:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_tab_pager.c:64:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_tab_pager.c:103:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_ui_table.c:124:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/bin/elementary/test_ui_table.c:129:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf, "%d items (%dx%d)", count, cols, rows);
data/efl-1.25.1/src/bin/elementary/test_ui_table.c:139:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/bin/elementary/test_ui_table.c:144:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(buf, "pack %d,%d %dx%d", col, row, colspan, rowspan);
data/efl-1.25.1/src/bin/elementary/test_ui_table.c:146:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(buf, "unpack %d,%d %dx%d", col, row, colspan, rowspan);
data/efl-1.25.1/src/bin/elementary/test_ui_table.c:528:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[64];
data/efl-1.25.1/src/bin/elementary/test_ui_table_static.c:73:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128];
data/efl-1.25.1/src/bin/elementary/test_ui_table_static.c:78:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(str, "Next API function (%u)", a->state);
data/efl-1.25.1/src/bin/elementary/test_ui_tags.c:60:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_web.c:60:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/bin/elementary/test_win_dialog.c:57:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[2048];
data/efl-1.25.1/src/bin/elementary/test_win_dialog.c:66:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf, "This is a dialog with min/max size<br>"
data/efl-1.25.1/src/bin/elementary/test_win_inline.c:11:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_win_inline.c:166:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char key[32];
data/efl-1.25.1/src/bin/elementary/test_win_inline.c:194:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_win_inline.c:195:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char key[32];
data/efl-1.25.1/src/bin/elementary/test_win_inline.c:216:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_win_keygrab.c:11:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char keyname[PATH_MAX];     /* Keyname          */
data/efl-1.25.1/src/bin/elementary/test_win_plug.c:103:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char key[32];
data/efl-1.25.1/src/bin/elementary/test_win_plug.c:131:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_win_plug.c:132:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char key[32];
data/efl-1.25.1/src/bin/elementary/test_win_plug.c:181:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_win_socket.c:17:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_win_stack.c:86:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[100];
data/efl-1.25.1/src/bin/elementary/test_win_state.c:688:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/elementary/test_win_wm_rotation.c:34:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ad->available_rots[i] = atoi(str);
data/efl-1.25.1/src/bin/elementary/test_win_wm_rotation.c:59:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          rot = atoi(str);
data/efl-1.25.1/src/bin/elementary/test_win_wm_rotation.c:71:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/bin/elementary/test_win_wm_rotation.c:100:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/bin/embryo/embryo_cc_amx.h:81:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char                name[sEXPMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc.h:61:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                name[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc.h:92:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                name[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc.h:111:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                name[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:115:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char         binfname[PATH_MAX];	/* binary file name */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:128:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char        *prefix[3] = { "error", "fatal error", "warning" };
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:150:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   return fopen(filename, "rb");
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:226:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   return fopen(filename, "wb");
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:263:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                incfname[PATH_MAX];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:264:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                reportname[PATH_MAX];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:572:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[PATH_MAX] = "";
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:613:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	 stack_size = atoi(argv[i]);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:651:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                path[PATH_MAX];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:677:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	     strcat(path, "include");
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:971:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                name[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1008:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                name[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1160:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                name[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1551:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                constname[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1586:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                enumname[sNAMEMAX + 1], constname[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1796:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(name, "++");
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1799:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(name, "--");
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1802:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(name, "==");
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1805:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(name, "!=");
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1808:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(name, "<=");
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1811:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(name, ">=");
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1829:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                tmpname[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1902:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     char                errname[2 * sNAMEMAX + 16];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1963:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(dest, "0%x", tag);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1971:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                tagstr1[10], tagstr2[10];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2021:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                opname[10];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2061:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                symbolname[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2180:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                symbolname[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2318:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     char                symname[2 * sNAMEMAX + 16];	/* allow space for user
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2421:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                name[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2563:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		       memcpy(sym->dim.arglist[argcnt].tags, tags,
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2698:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy(arg->defvalue.array.data, litq, litidx * sizeof(cell));
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2774:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(arg->tags, tags, numtags * sizeof tags[0]);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2883:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                symname[2 * sNAMEMAX + 16];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2978:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     char                symbolname[16];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:3681:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                labelname[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:3962:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     char                symname[2 * sNAMEMAX + 16];	/* allow space for user
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:147:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     char                path[PATH_MAX + PATH_MAX + 128];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:181:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                name[PATH_MAX], c;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:924:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     char                pathname[PATH_MAX];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:948:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  char pathname[PATH_MAX];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:995:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       char                name[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1037:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       char                name[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1099:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       char                name[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   char                name[41];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1214:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char                s2[20];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1424:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   switch (open)
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1446:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (*string == open)
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1477:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dest, src, srclen);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1485:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char               *p, *s, *e, *args[10];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1862:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char         _lexstr[sLINEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:2167:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                s1[20], s2[20];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:2401:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(newsym, entry, sizeof(symbol));
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:2771:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char         itohstr[15];	/* hex number is 10 characters long at most */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:68:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char         lastsymbol[sNAMEMAX + 1];	/* name of last function/variable */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:141:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                opername[4] = "", symbolname[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:229:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                symname[2 * sNAMEMAX + 16];	/* allow space for user defined operators */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:498:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     char                symname[2 * sNAMEMAX + 16];	/* allow space for user defined operators */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:1653:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  char                symname[2 * sNAMEMAX + 16];	/* allow space for user defined operators */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:1905:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                arglist[sMAXARGS];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc5.c:62:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                string[1024];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:168:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     unsigned char       t[5];	/* a 32-bit cell is encoded in max. 5 bytes (3 bytes for a 16-bit cell) */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:287:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                name[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:616:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                str[MAX_INSTR_LEN];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:657:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                line[256], *instr, *params;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:687:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                alias[sNAMEMAX + 1] = "";
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:872:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     char                alias[sNAMEMAX + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:372:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                str[160];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:394:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   strexpand(str, (unsigned char *)sequences_cmp[i].find, sizeof str,
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:402:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   strexpand(str, (unsigned char *)sequences_cmp[i].replace, sizeof str,
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:444:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
matchsequence(char *start, char *end, char *pattern,
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:444:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
matchsequence(char *start, char *end, char *pattern,
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:444:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
matchsequence(char *start, char *end, char *pattern,
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:445:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char symbols[_maxoptvars][_aliasmax + 1], int *match_length)
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:448:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                str[_aliasmax + 2];
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:466:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	     var = atoi(pattern) - 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:514:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char        *
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:515:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
replacesequence(char *pattern, char symbols[_maxoptvars][_aliasmax + 1],
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:515:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
replacesequence(char *pattern, char symbols[_maxoptvars][_aliasmax + 1],
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:537:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	     var = atoi(sptr) - 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:570:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	     var = atoi(pattern) - 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:603:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dest, replace, repl_length);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:618:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                symbols[_maxoptvars][_aliasmax + 1];
data/efl-1.25.1/src/bin/embryo/embryo_cc_scexpand.c:20:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
strexpand(char *dest, unsigned char *source, int maxlen, unsigned char pairtable[128][2])
data/efl-1.25.1/src/bin/embryo/embryo_cc_scexpand.c:20:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
strexpand(char *dest, unsigned char *source, int maxlen, unsigned char pairtable[128][2])
data/efl-1.25.1/src/bin/embryo/embryo_cc_scexpand.c:20:67:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
strexpand(char *dest, unsigned char *source, int maxlen, unsigned char pairtable[128][2])
data/efl-1.25.1/src/bin/embryo/embryo_cc_scexpand.c:22:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char       stack[STACKSIZE];
data/efl-1.25.1/src/bin/embryo/embryo_cc_scvars.c:41:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     pline[sLINEMAX + 1];	/* the line read from the input file */
data/efl-1.25.1/src/bin/eolian/docs.c:417:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/eolian/main.c:21:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *_dexts[6] =
data/efl-1.25.1/src/bin/eolian/main.c:140:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, basen, blen);
data/efl-1.25.1/src/bin/eolian/main.c:144:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(p, ext, elen);
data/efl-1.25.1/src/bin/eolian/main.c:147:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, _dexts[i], dlen);
data/efl-1.25.1/src/bin/eolian/main.c:165:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char iname[256] = {0};
data/efl-1.25.1/src/bin/eolian/main.c:205:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *f = fopen(fname, "wb");
data/efl-1.25.1/src/bin/eolian/main.c:234:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *f = fopen(fname, "rb");
data/efl-1.25.1/src/bin/eolian/main.c:493:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *outs[sizeof(_dexts) / sizeof(void *)] = {
data/efl-1.25.1/src/bin/eolian/sources.c:1345:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[256 + 128], iname[256];
data/efl-1.25.1/src/bin/eolian/sources.c:1503:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fname[128];
data/efl-1.25.1/src/bin/eolian/sources.c:1518:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fname[128];
data/efl-1.25.1/src/bin/eolian/sources.c:1532:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ibuf[512];
data/efl-1.25.1/src/bin/eolian_cxx/eolian_cxx.cc:214:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        header_decl.open(header_decl_file_name);
data/efl-1.25.1/src/bin/eolian_cxx/eolian_cxx.cc:223:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        header_impl.open(header_impl_file_name);
data/efl-1.25.1/src/bin/eolian_cxx/eolian_cxx.cc:329:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
               header_decl.open(opts.out_file);
data/efl-1.25.1/src/bin/eolian_cxx/eolian_cxx.cc:386:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       main_header.open(opts.out_file);
data/efl-1.25.1/src/bin/eolian_mono/eolian_mono.cc:136:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
           output_file.open(class_file_name);
data/efl-1.25.1/src/bin/ethumb_client/ethumbd.c:545:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	     memcpy(bdata, sdata, nbytes);
data/efl-1.25.1/src/bin/ethumb_client/ethumbd.c:823:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/bin/ethumb_client/ethumbd.c:1720:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/bin/ethumb_client/ethumbd_slave.c:114:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = { '\0' };
data/efl-1.25.1/src/bin/exactness/common.c:13:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        pid_t original_pid = atoi(original_pid_env);
data/efl-1.25.1/src/bin/exactness/common.c:26:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char pid[30];
data/efl-1.25.1/src/bin/exactness/common.c:303:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char entry[32];
data/efl-1.25.1/src/bin/exactness/common.c:305:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(entry, "images/%d", i + 1);
data/efl-1.25.1/src/bin/exactness/common.c:350:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char entry[32];
data/efl-1.25.1/src/bin/exactness/common.c:351:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(entry, "images/%d", i++);
data/efl-1.25.1/src/bin/exactness/common.h:36:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(info->buffer, buffer, info->size); \
data/efl-1.25.1/src/bin/exactness/common.h:57:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&__i, _buf, sizeof(int)); \
data/efl-1.25.1/src/bin/exactness/common.h:65:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&__d, _buf, sizeof(double)); \
data/efl-1.25.1/src/bin/exactness/common.h:81:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(_buf, &__si, sizeof(int)); \
data/efl-1.25.1/src/bin/exactness/common.h:88:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(_buf, &__d2, sizeof(double)); \
data/efl-1.25.1/src/bin/exactness/common.h:95:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (__s) memcpy(_buf, __s, __len); \
data/efl-1.25.1/src/bin/exactness/exactness.c:85:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ex_img->pixels, evas_object_image_data_get(img, EINA_FALSE), len);
data/efl-1.25.1/src/bin/exactness/exactness.c:221:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char scn_path[PATH_MAX];
data/efl-1.25.1/src/bin/exactness/exactness.c:305:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[SCHEDULER_CMD_SIZE];
data/efl-1.25.1/src/bin/exactness/exactness.c:344:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[BUF_SIZE] = "";
data/efl-1.25.1/src/bin/exactness/exactness.c:346:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   file = fopen(filename, "r");
data/efl-1.25.1/src/bin/exactness/exactness.c:481:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[PATH_MAX];
data/efl-1.25.1/src/bin/exactness/exactness.c:641:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char report_filename[PATH_MAX] = "";
data/efl-1.25.1/src/bin/exactness/exactness.c:646:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        report_file = fopen(report_filename, "w+");
data/efl-1.25.1/src/bin/exactness/exactness.c:677:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       char origpath[PATH_MAX];
data/efl-1.25.1/src/bin/exactness/inspect.c:98:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_action_specific_info_get(const Exactness_Action *act, char output[1024])
data/efl-1.25.1/src/bin/exactness/inspect.c:105:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
              sprintf(output, "Direction %d Z %d", t->direction, t->z);
data/efl-1.25.1/src/bin/exactness/inspect.c:113:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                 sprintf(output, "Button %d Flags %d", t->b, t->flags);
data/efl-1.25.1/src/bin/exactness/inspect.c:115:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                 sprintf(output, "D %d X %d Y %d Rad %f RadX %f RadY %f Pres %f Ang %f FX %f FY %f Flags %d",
data/efl-1.25.1/src/bin/exactness/inspect.c:123:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                 sprintf(output, "X %d Y %d", t->x, t->y);
data/efl-1.25.1/src/bin/exactness/inspect.c:125:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                 sprintf(output, "D %d X %d Y %d Rad %f RadX %f RadY %f Pres %f Ang %f FX %f FY %f",
data/efl-1.25.1/src/bin/exactness/inspect.c:309:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/bin/exactness/inspect.c:317:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char buf2[256];
data/efl-1.25.1/src/bin/exactness/inspect.c:368:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char params1[1024];
data/efl-1.25.1/src/bin/exactness/inspect.c:369:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char params2[2024];
data/efl-1.25.1/src/bin/exactness/inspect.c:386:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char specific_output[1024];
data/efl-1.25.1/src/bin/exactness/inspect.c:1214:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ex_img->pixels, evas_object_image_data_get(img, EINA_FALSE), len);
data/efl-1.25.1/src/bin/exactness/inspect.c:1477:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char specific_output[1024];
data/efl-1.25.1/src/bin/exactness/player.c:121:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ex_img->pixels, pixels, nb_bytes);
data/efl-1.25.1/src/bin/exactness/player.c:159:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(ex_img, ex_shot, sizeof(Exactness_Image));
data/efl-1.25.1/src/bin/exactness/player.c:170:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(tmp, ex_shot->pixels, ex_shot->w * ex_shot->h * 4);
data/efl-1.25.1/src/bin/exactness/player.c:963:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/bin/exactness/recorder.c:92:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(act->data, data, len);
data/efl-1.25.1/src/examples/ecore/ecore_audio_playback.c:172:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[20];
data/efl-1.25.1/src/examples/ecore/ecore_audio_playback.c:268:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                   freq = atoi(&val[5]);
data/efl-1.25.1/src/examples/ecore/ecore_con_client_example.c:62:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char lbuf[4096] = "";
data/efl-1.25.1/src/examples/ecore/ecore_con_client_simple_example.c:61:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fmt[128];
data/efl-1.25.1/src/examples/ecore/ecore_con_client_simple_example.c:94:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     port = atoi(argv[2]);
data/efl-1.25.1/src/examples/ecore/ecore_con_eet_client_example.c:60:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                  atoi(argv[2]), NULL);
data/efl-1.25.1/src/examples/ecore/ecore_con_eet_server_example.c:76:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                              atoi(argv[2]), NULL);
data/efl-1.25.1/src/examples/ecore/ecore_con_server_http_example.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[4096];
data/efl-1.25.1/src/examples/ecore/ecore_con_server_http_example.c:77:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fmt[128];
data/efl-1.25.1/src/examples/ecore/ecore_con_server_simple_example.c:72:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fmt[128];
data/efl-1.25.1/src/examples/ecore/ecore_con_url_download_example.c:75:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(filename, O_CREAT | O_BINARY | O_WRONLY | O_TRUNC, 0644);
data/efl-1.25.1/src/examples/ecore/ecore_evas_buffer_example_01.c:41:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(dest, "wb+");
data/efl-1.25.1/src/examples/ecore/ecore_evas_extn_socket_example.c:96:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf, "Hello. I'm server!! number=%d!!", num);
data/efl-1.25.1/src/examples/ecore/ecore_evas_window_sizes_example.c:47:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/examples/ecore/ecore_exe_example.c:15:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[BUFFER_SIZE];
data/efl-1.25.1/src/examples/ecore/ecore_exe_example.c:42:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[BUFFER_SIZE];
data/efl-1.25.1/src/examples/ecore/ecore_exe_example.c:44:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg, " Message: %d\n", numberOfMessages);
data/efl-1.25.1/src/examples/ecore/ecore_exe_example_child.c:21:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char message[BUFFER_SIZE];
data/efl-1.25.1/src/examples/ecore/ecore_fd_handler_example.c:24:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/examples/ecore/ecore_fd_handler_gnutls_example.c:113:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   sa.sin_port = eina_htons(atoi(PORT));
data/efl-1.25.1/src/examples/ecore/ecore_ipc_client_example.c:61:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char lbuf[4096] = "";
data/efl-1.25.1/src/examples/ecore/ecore_pipe_simple_example.c:28:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(str, buf, len);
data/efl-1.25.1/src/examples/ecore/ecore_thread_example.c:73:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[200];
data/efl-1.25.1/src/examples/ecore/ecore_thread_example.c:100:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[32];
data/efl-1.25.1/src/examples/ecore/ecore_thread_example.c:365:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[32];
data/efl-1.25.1/src/examples/ecore/efl_exe.c:16:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/examples/ecore/efl_net_control_example.c:47:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[128];
data/efl-1.25.1/src/examples/ecore/efl_net_control_example.c:466:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[100];
data/efl-1.25.1/src/examples/ecore/efl_net_control_example.c:1369:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *dummy[1] = { NULL };
data/efl-1.25.1/src/examples/ecore/efl_net_dialer_simple_example.c:60:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[4];
data/efl-1.25.1/src/examples/ecore/efl_net_dialer_unix_example.c:32:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4];
data/efl-1.25.1/src/examples/ecore/efl_net_dialer_websocket_autobahntestee.c:288:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char url[4096];
data/efl-1.25.1/src/examples/ecore/efl_net_dialer_websocket_autobahntestee.c:389:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char url[4096];
data/efl-1.25.1/src/examples/ecore/efl_net_dialer_websocket_autobahntestee.c:390:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[256];
data/efl-1.25.1/src/examples/ecore/efl_net_dialer_websocket_autobahntestee.c:463:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char url[4096];
data/efl-1.25.1/src/examples/ecore/efl_net_dialer_websocket_autobahntestee.c:464:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[64];
data/efl-1.25.1/src/examples/ecore/efl_net_dialer_websocket_autobahntestee.c:549:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char url[4096];
data/efl-1.25.1/src/examples/ecore/efl_net_dialer_windows_example.c:32:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4];
data/efl-1.25.1/src/examples/ecore/efl_net_ip_address_example.c:26:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[INET6_ADDRSTRLEN] = "?";
data/efl-1.25.1/src/examples/ecore/efl_net_socket_ssl_dialer_example.c:28:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[63]; /* INFO: SSL read '...' will fit in 80 columns */
data/efl-1.25.1/src/examples/ecore/efl_thread.c:30:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/examples/ecore/efl_thread.c:107:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/examples/ecore/efl_thread.c:141:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/examples/ecore/efl_thread.c:172:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) threads = atoi(s);
data/efl-1.25.1/src/examples/ecore_avahi/ecore_avahi_browse_example.c:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char a[AVAHI_ADDRESS_STR_MAX], *t;
data/efl-1.25.1/src/examples/ecore_avahi/ecore_avahi_example.c:159:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   example.port = atoi(argv[2]);
data/efl-1.25.1/src/examples/edje/edje-anchors.c:29:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[PATH_MAX] = { 0, };
data/efl-1.25.1/src/examples/edje/edje-box2.c:97:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pos = atoi(ev->key);
data/efl-1.25.1/src/examples/edje/edje-box2.c:107:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pos = atoi(ev->key);
data/efl-1.25.1/src/examples/edje/edje-perspective.c:73:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[64];
data/efl-1.25.1/src/examples/edje/edje-signals-messages.c:61:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024];
data/efl-1.25.1/src/examples/edje/edje-text.c:55:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char envbuf[20]; // doesn't have to be static, but a good habit
data/efl-1.25.1/src/examples/edje/edje-text.c:90:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(s, "LANGUAGE=");
data/efl-1.25.1/src/examples/eet/eet-data-cipher_decipher.c:28:23:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
   if (-1 == (tmpfd = mkstemp(file)) || !!close(tmpfd))
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_01.c:314:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[PATH_MAX];
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c:377:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   _st1_set(&(un->u.st1), atof(v1), atoi(v2), eina_stringshare_add(v3));
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c:395:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   _st2_set(&(un->u.st2), atoi(v1), atoi(v2));
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c:395:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   _st2_set(&(un->u.st2), atoi(v1), atoi(v2));
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c:412:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   _st3_set(&(un->u.st3), atoi(v1));
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c:467:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   _st1_set(st1, atof(v1), atoi(v2), eina_stringshare_add(v3));
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c:493:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   _st2_set(st2, atoi(v1), atoi(v2));
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c:493:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   _st2_set(st2, atoi(v1), atoi(v2));
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c:513:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   _st3_set(st3, atoi(v1));
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c:603:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[PATH_MAX];
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c:760:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                  int type = atoi(argv[4]);
data/efl-1.25.1/src/examples/eet/eet-data-file_descriptor_02.c:894:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                  int type = atoi(argv[4]);
data/efl-1.25.1/src/examples/eet/eet-data-nested.c:172:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[PATH_MAX];
data/efl-1.25.1/src/examples/eet/eet-data-simple.c:132:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[PATH_MAX];
data/efl-1.25.1/src/examples/eet/eet-file.c:12:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024], *ptr;
data/efl-1.25.1/src/examples/eet/eet-file.c:38:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(buf, "Here is a string of data to save!");
data/efl-1.25.1/src/examples/eet/eet-file.c:53:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, some_strings[i], len);
data/efl-1.25.1/src/examples/eina/eina_simple_xml_parser_01.c:26:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((file = fopen("chat.xml", "rb")))
data/efl-1.25.1/src/examples/eina/eina_simple_xml_parser_01.c:73:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[length+1];
data/efl-1.25.1/src/examples/eina/eina_simple_xml_parser_01.c:75:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[512] = {'\0'};
data/efl-1.25.1/src/examples/eina/eina_simple_xml_parser_02.c:48:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   file = fopen("exia.xml", "rb");
data/efl-1.25.1/src/examples/eina/eina_str_01.c:31:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(str, "bsd");
data/efl-1.25.1/src/examples/eina/eina_value_03.c:59:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, mem, type->value_size);
data/efl-1.25.1/src/examples/eina/eina_value_03.c:126:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/examples/eina/eina_value_04.c:12:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/examples/eldbus/complex-types-server.c:162:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *array_string[5] = {"qqqq", "wwwww", "eeeeee", "rrrrr", "ttttt"};
data/efl-1.25.1/src/examples/eldbus/complex-types-server.c:379:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(resp2, "test");
data/efl-1.25.1/src/examples/eldbus/complex-types.c:128:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *string[10];
data/efl-1.25.1/src/examples/eldbus/complex-types.c:196:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *array[5] = { "aaaa", "bbbb", "cccc", "dddd", "eeee" };
data/efl-1.25.1/src/examples/elementary/bg_example_02.c:11:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/bg_example_03.c:23:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buff[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/bg_example_03.c:58:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/calendar_example_02.c:18:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/examples/elementary/combobox_example_01.c:52:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/combobox_example_01.c:69:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/dayselector_example.c:18:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/diskselector_example_02.c:29:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[32];
data/efl-1.25.1/src/examples/elementary/diskselector_example_02.c:42:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[32];
data/efl-1.25.1/src/examples/elementary/diskselector_example_02.c:65:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[32];
data/efl-1.25.1/src/examples/elementary/diskselector_example_02.c:94:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[32];
data/efl-1.25.1/src/examples/elementary/efl_canvas_textblock_obstacles_example.c:45:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char         *font[3];
data/efl-1.25.1/src/examples/elementary/efl_canvas_textblock_obstacles_example.c:48:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char         *wrap[4];
data/efl-1.25.1/src/examples/elementary/efl_canvas_textblock_obstacles_example.c:75:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[2000];
data/efl-1.25.1/src/examples/elementary/efl_ui_collection_view_example_1.c:23:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/efl_ui_list_example_1.c:108:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/efl_ui_list_view_example_1.c:31:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/efl_ui_list_view_example_3.c:38:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char edj_path[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/efl_ui_scroller_example.c:13:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/examples/elementary/efl_ui_slideshow_example.c:101:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/entry_example.c:101:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[512];
data/efl-1.25.1/src/examples/elementary/entry_example.c:127:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/examples/elementary/entry_example.c:142:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   aid->width = atoi(elm_object_text_get(obj));
data/efl-1.25.1/src/examples/elementary/entry_example.c:150:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   aid->height = atoi(elm_object_text_get(obj));
data/efl-1.25.1/src/examples/elementary/entry_example.c:160:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[100];
data/efl-1.25.1/src/examples/elementary/entry_example.c:382:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fmt_open[5], fmt_close[6];
data/efl-1.25.1/src/examples/elementary/filemvc.c:26:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char imagedefault_path[256];
data/efl-1.25.1/src/examples/elementary/filter_example.c:64:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/gengrid_example.c:19:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *imgs[9] =
data/efl-1.25.1/src/examples/elementary/gengrid_example.c:299:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/gengrid_example.c:316:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/genlist_example_01.c:13:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/genlist_example_02.c:15:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/genlist_example_03.c:14:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/genlist_example_04.c:16:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/genlist_example_04.c:54:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/genlist_example_05.c:23:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256] = {0};
data/efl-1.25.1/src/examples/elementary/genlist_example_05.c:54:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/genlist_example_05.c:78:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256] = {0};
data/efl-1.25.1/src/examples/elementary/image_example_01.c:10:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/image_webp_example_01.c:10:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/image_webp_example_02.c:10:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/index_example_01.c:118:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[32];
data/efl-1.25.1/src/examples/elementary/index_example_02.c:51:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/index_example_02.c:118:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[32];
data/efl-1.25.1/src/examples/elementary/layout_example_01.c:27:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[30];
data/efl-1.25.1/src/examples/elementary/layout_example_01.c:58:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/layout_example_03.c:46:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/list_example_03.c:21:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[32];
data/efl-1.25.1/src/examples/elementary/list_example_03.c:35:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[32];
data/efl-1.25.1/src/examples/elementary/list_example_03.c:49:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[32];
data/efl-1.25.1/src/examples/elementary/list_example_03.c:74:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[32];
data/efl-1.25.1/src/examples/elementary/list_example_03.c:103:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[32];
data/efl-1.25.1/src/examples/elementary/list_example_03.c:177:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[32];
data/efl-1.25.1/src/examples/elementary/list_example_03.c:209:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char label[32];
data/efl-1.25.1/src/examples/elementary/map_example_02.c:41:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/map_example_02.c:49:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/map_example_02.c:57:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/map_example_02.c:65:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/map_example_02.c:162:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[255];
data/efl-1.25.1/src/examples/elementary/photocam_example_01.c:26:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/popup_example_02.c:12:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/popup_example_03.c:14:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/elementary/progressbar_example.c:93:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[30];
data/efl-1.25.1/src/examples/elementary/progressbar_example.c:112:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[30];
data/efl-1.25.1/src/examples/elementary/progressbar_example.c:154:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/scroller_example_02.c:117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[256];
data/efl-1.25.1/src/examples/elementary/slideshow_example.c:139:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char img[IMG_NUM][PATH_MAX];
data/efl-1.25.1/src/examples/elementary/theme_example_01.c:6:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char edj_path[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/theme_example_01.c:51:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(edj_path, "./theme_example.edj");
data/efl-1.25.1/src/examples/elementary/theme_example_02.c:6:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char edj_path[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/theme_example_02.c:31:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(edj_path, "./theme_example.edj");
data/efl-1.25.1/src/examples/elementary/thumb_example_01.c:32:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/transit_example_03.c:170:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/transit_example_04.c:86:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/elementary/web_example_02.c:94:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[20] = "";
data/efl-1.25.1/src/examples/elementary/win_example.c:185:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/ephysics/ephysics_logo.c:110:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/examples/ephysics/test_velocity.c:46:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[64];
data/efl-1.25.1/src/examples/evas/efl-canvas-vg-simple.c:48:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *morph1[2] = {"M 0,0 L 0,0 L 100,0 L 100,0 L 100,100 L 100,100 L 0,100 L 0,100 L 0,0",
data/efl-1.25.1/src/examples/evas/evas-box.c:124:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        pos = atoi(ev->key);
data/efl-1.25.1/src/examples/evas/evas-box.c:142:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        pos = atoi(ev->key);
data/efl-1.25.1/src/examples/evas/evas-buffer-simple.c:294:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(dest, "wb+");
data/efl-1.25.1/src/examples/evas/evas-images3.c:107:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(bufpixels, pixels, sizeof(char) * stride * h);
data/efl-1.25.1/src/examples/evas/evas-multiseat-events.c:97:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/examples/evas/evas-smart-interface.c:768:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data, iface1_data, sizeof(iface1_data));
data/efl-1.25.1/src/examples/evas/evas-text.c:64:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char         *font[3];
data/efl-1.25.1/src/examples/evas/evas-textblock-obstacles.c:56:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char         *font[3];
data/efl-1.25.1/src/examples/evas/evas-textblock-obstacles.c:59:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char         *wrap[4];
data/efl-1.25.1/src/examples/evas/evas-textblock-obstacles.c:107:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[2000];
data/efl-1.25.1/src/examples/evas/evas-vg-json.c:77:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/examples/evas/evas-vg-simple.c:70:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *morph1[2] = {"M 0,0 L 0,0 L 100,0 L 100,0 L 100,100 L 100,100 L 0,100 L 0,100 L 0,0",
data/efl-1.25.1/src/generic/evas/gst/main.c:194:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(data, info.data, info.size);
data/efl-1.25.1/src/generic/evas/gst/main.c:243:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             size_w = atoi(argv[i]);
data/efl-1.25.1/src/generic/evas/gst/main.c:245:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             size_h = atoi(argv[i]);
data/efl-1.25.1/src/generic/evas/pdf/main.cpp:22:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char RGB24[3];
data/efl-1.25.1/src/generic/evas/pdf/main.cpp:219:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             page_num = atoi(argv[i]);
data/efl-1.25.1/src/generic/evas/pdf/main.cpp:230:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             dpi = ((double)atoi(argv[i])) / 1000.0; // dpi is an int multiplied by 1000 (so 72dpi is 72000)
data/efl-1.25.1/src/generic/evas/pdf/main.cpp:236:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             size_w = atoi(argv[i]);
data/efl-1.25.1/src/generic/evas/pdf/main.cpp:238:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             size_h = atoi(argv[i]);
data/efl-1.25.1/src/generic/evas/pdf/main.cpp:266:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char buf[1024];
data/efl-1.25.1/src/generic/evas/ps/main.c:225:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             page_nbr = atoi(argv[i]);
data/efl-1.25.1/src/generic/evas/ps/main.c:236:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             dpi = ((double)atoi(argv[i])) / 1000.0; // dpi is an int multiplied by 1000 (so 72dpi is 72000)
data/efl-1.25.1/src/generic/evas/ps/main.c:242:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             size_w = atoi(argv[i]);
data/efl-1.25.1/src/generic/evas/ps/main.c:244:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             size_h = atoi(argv[i]);
data/efl-1.25.1/src/generic/evas/raw/main.c:52:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(file, O_RDONLY);
data/efl-1.25.1/src/generic/evas/rsvg/main.c:185:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             scale_down = atoi(argv[i]);
data/efl-1.25.1/src/generic/evas/rsvg/main.c:190:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             dpi = ((double)atoi(argv[i])) / 1000.0;
data/efl-1.25.1/src/generic/evas/rsvg/main.c:195:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             size_w = atoi(argv[i]);
data/efl-1.25.1/src/generic/evas/rsvg/main.c:197:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             size_h = atoi(argv[i]);
data/efl-1.25.1/src/generic/evas/xcf/main.c:262:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char  data[CHUNK_SIZE];
data/efl-1.25.1/src/generic/evas/xcf/main.c:281:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f->fd = open(file, O_RDONLY);
data/efl-1.25.1/src/generic/evas/xcf/main.c:363:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, f->chunk[c]->data + off, amount);
data/efl-1.25.1/src/generic/evas/xcf/main.c:1572:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char id[14];
data/efl-1.25.1/src/generic/evas/xcf/main.c:1603:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        image->file_version = atoi(id + 10);
data/efl-1.25.1/src/lib/ecore/ecore.c:138:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = "";
data/efl-1.25.1/src/lib/ecore/ecore.c:298:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char tmp[1024];
data/efl-1.25.1/src/lib/ecore/ecore.c:301:39:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       _ecore_memory_statistic_file = fopen(tmp, "wb");
data/efl-1.25.1/src/lib/ecore/ecore.c:312:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        double sec = ((double) atoi(getenv("WATCHDOG_USEC"))) / 1000 / 1000;
data/efl-1.25.1/src/lib/ecore/ecore.c:330:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (s) _no_system_modules = atoi(s);
data/efl-1.25.1/src/lib/ecore/ecore.c:861:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore/ecore.c:871:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   _ecore_fps_debug_fd = open(buf, O_CREAT | O_BINARY | O_TRUNC | O_RDWR, 0644);
data/efl-1.25.1/src/lib/ecore/ecore.c:875:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        _ecore_fps_debug_fd = open(buf, O_CREAT | O_BINARY | O_TRUNC | O_RDWR, 0644);
data/efl-1.25.1/src/lib/ecore/ecore.c:918:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[4096];
data/efl-1.25.1/src/lib/ecore/ecore_app.c:43:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *args[4096];
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:393:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              devnull = open("/dev/null", O_RDONLY);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:401:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              devnull = open("/dev/null", O_WRONLY);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:409:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              devnull = open("/dev/null", O_WRONLY);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:648:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((char *)exe->write_data_buf + exe->write_data_size, data, size);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:816:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                 memcpy(exe->read_data_buf, c, exe->read_data_size);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:828:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                 memcpy(exe->error_data_buf, c, exe->error_data_size);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:1181:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char buf[READBUFSIZ];
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:1203:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                 memcpy(inbuf + inbuf_num, buf, num);
data/efl-1.25.1/src/lib/ecore/ecore_exe_win32.c:107:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/ecore/ecore_exe_win32.c:206:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(b + exe->pipe_read.data_size,
data/efl-1.25.1/src/lib/ecore/ecore_exe_win32.c:236:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(b + exe->pipe_error.data_size,
data/efl-1.25.1/src/lib/ecore/ecore_exe_win32.c:390:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char exe_cmd_buf[32768];
data/efl-1.25.1/src/lib/ecore/ecore_exe_win32.c:673:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                         memcpy(exe->pipe_read.data_buf, c, exe->pipe_read.data_size);
data/efl-1.25.1/src/lib/ecore/ecore_exe_win32.c:685:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                         memcpy(exe->pipe_error.data_buf, c, exe->pipe_error.data_size);
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:110:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char metavar[32];
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:373:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(metavar, txt, *metavarlen);
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:438:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:667:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char metavar[32] = "ARG";
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:803:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        cols = atoi(var);
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:1030:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char metavar[32];
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:1859:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char metavar[32];
data/efl-1.25.1/src/lib/ecore/ecore_internal.h:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];                                                       \
data/efl-1.25.1/src/lib/ecore/ecore_main_timechanges.c:28:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[8];
data/efl-1.25.1/src/lib/ecore/efl_app.c:52:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const signed char primap[EFL_TASK_PRIORITY_ULTRA + 1] =
data/efl-1.25.1/src/lib/ecore/efl_boolean_model.c:27:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buffer[256];
data/efl-1.25.1/src/lib/ecore/efl_exe.c:80:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const signed char primap[EFL_TASK_PRIORITY_ULTRA + 1] =
data/efl-1.25.1/src/lib/ecore/efl_exe.c:539:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        devnull = open("/dev/null", O_RDONLY);
data/efl-1.25.1/src/lib/ecore/efl_exe.c:555:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        devnull = open("/dev/null", O_WRONLY);
data/efl-1.25.1/src/lib/ecore/efl_exe.c:570:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        devnull = open("/dev/null", O_WRONLY);
data/efl-1.25.1/src/lib/ecore/efl_io_file.c:148:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          fd = open(path, pd->flags, pd->mode);
data/efl-1.25.1/src/lib/ecore/efl_io_file.c:150:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          fd = open(path, pd->flags);
data/efl-1.25.1/src/lib/ecore/efl_thread.c:55:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char b[64];
data/efl-1.25.1/src/lib/ecore/efl_thread.c:810:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(thdat->event_cb, pd->event_cb,
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out_pulse.c:330:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(dispenv, "DISPLAY=");
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_pulse.c:42:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_pulse_ml.c:45:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/lib/ecore_con/Ecore_Con.h:601:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char data[1]; /**< the data received on this event */
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:222:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, "abstract:", sizeof("abstract:") - 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:227:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf, src, pathlen);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:299:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char p[INET6_ADDRSTRLEN];
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:404:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[sizeof(struct sockaddr_un)] = "";
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:417:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(buf + 1, path, strlen(path) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:495:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")] = "";
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:648:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")] = "";
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:707:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(d->hints, hints, sizeof(struct addrinfo));
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:744:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:855:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(d->addr, addr, addrlen);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:939:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")] = "";
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1004:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(addr, addrinfo->ai_addr, addrinfo->ai_addrlen);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1013:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(addr, results->ai_addr, results->ai_addrlen);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1093:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[INET_ADDRSTRLEN + sizeof(":65536")];
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1118:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(request->ipv4, &a->sin_addr, 4);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1145:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&d->addr, addrinfo->ai_addr, addrinfo->ai_addrlen);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1224:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(request->indent, proxy_user, strlen(proxy_user) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1323:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(request->indent, proxy_user, strlen(proxy_user) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1324:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(request->indent + strlen(proxy_user) + 1, host, strlen(host) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1368:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                 memcpy(&d->addr4.sin_addr, reply.ipv4, 4);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1465:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(request->ipv4.address, &a->sin_addr, 4);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1481:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(request->ipv6.address, &a->sin6_addr, 16);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1506:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(p, name, namelen);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1509:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(p, &port, sizeof(port));
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1565:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (user) memcpy(msg + 1 + 1, user, user_len);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1567:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (pass) memcpy(msg + 1 + 1 + user_len + 1, pass, pass_len);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1611:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1704:44:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                           memcpy(&d->addr, addrinfo->ai_addr, addrinfo->ai_addrlen);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1730:44:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                           memcpy(&d->addr, addrinfo->ai_addr, addrinfo->ai_addrlen);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1984:59:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                                          memcpy(&d->addr4.sin_addr, ipv4.address, 4);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:2007:59:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                                          memcpy(&d->addr6.sin6_addr, ipv6.address, 16);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:2303:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(str, address, iface - address);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet.c:286:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(n->buffer + n->buffer_current, data, size);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet.c:565:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tmp, protocol, sizeof (protocol));
data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet.c:566:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tmp + sizeof (protocol), protocol_name, protocol_length);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet.c:567:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tmp + sizeof (protocol) + protocol_length, section, section_length);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_legacy.c:647:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                  cl->port = atoi(portstr);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_legacy.c:1470:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ip, address, p - address);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_legacy.c:1507:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char address[4096] = "";
data/efl-1.25.1/src/lib/ecore_con/ecore_con_legacy.c:1813:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[4096], port[16] = "";
data/efl-1.25.1/src/lib/ecore_con/ecore_con_legacy.c:1881:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char address[4096] = "";
data/efl-1.25.1/src/lib/ecore_con/ecore_con_legacy.c:2637:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ip[INET6_ADDRSTRLEN];
data/efl-1.25.1/src/lib/ecore_con/ecore_con_local.c:34:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256 - sizeof(PIPE_NS)] = "";
data/efl-1.25.1/src/lib/ecore_con/ecore_con_local.c:42:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR user[sizeof(buf) - sizeof("ecore!u!n!1")] = "unknown";
data/efl-1.25.1/src/lib/ecore_con/ecore_con_local.c:64:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/ecore_con/ecore_con_local_win32.c:367:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/ecore_con/ecore_con_proxy_helper.c:65:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_con/ecore_con_proxy_helper.c:283:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                       int id = atoi(line + 2);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:109:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:113:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char addr[sizeof(struct in_addr)];
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:115:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char addr6[sizeof(struct in6_addr)];
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:132:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf, socks, strlen(socks) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:485:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(str, "\r\n", strlen("\r\n") + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:499:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(str, "\r\n", strlen("\r\n") + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:550:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:984:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(s, key, strlen(key) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:987:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(s, value, strlen(value) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:1155:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[4096];
data/efl-1.25.1/src/lib/ecore_con/efl_net_control-connman.c:961:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[128];
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:709:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[256];
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:975:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(p, ro_slice.mem, ro_slice.len);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:1410:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(ctx->url, "http://", strlen("http://"));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:1411:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(ctx->url + strlen("http://"), address, strlen(address) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:2389:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_simple.c:315:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(mem, slice.mem, slice.len);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_tcp.c:144:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")] = "";
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_udp.c:113:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_udp.c:226:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")] = "";
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_unix.c:164:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(addr.sun_path + 1, path, strlen(path) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_unix.c:175:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(addr.sun_path, path, strlen(path) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:168:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char accept_key[29]; /* 28 + \0 */
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:276:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(bytes, &plen, sizeof(plen));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:285:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(bytes, &plen, sizeof(plen));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:515:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&r, pd->recv.current.payload, sizeof(uint16_t));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:593:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&fh, pd->recv.tmpbuf, pd->recv.needed);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:903:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(tmp, "ws://", strlen("ws://"));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:904:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(tmp + strlen("ws://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:915:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(tmp, "wss://", strlen("wss://"));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:916:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(tmp + strlen("wss://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1011:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(protocols + offset, ", ", strlen(", "));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1014:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(protocols + offset, str, eina_stringshare_strlen(str));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1144:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(tmp, "http://", strlen("http://"));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1145:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(tmp + strlen("http://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1152:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(tmp, "https://", strlen("https://"));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1153:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(tmp + strlen("https://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_windows.c:40:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cstr[256], sstr[256];
data/efl-1.25.1/src/lib/ecore_con/efl_net_ip_address.c:16:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char string[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_ip_address.c:155:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char old_str[INET6_ADDRSTRLEN] = "";
data/efl-1.25.1/src/lib/ecore_con/efl_net_ip_address.c:156:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char new_str[INET6_ADDRSTRLEN] = "";
data/efl-1.25.1/src/lib/ecore_con/efl_net_ip_address.c:351:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(tmp + 1, numeric_address, len);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_tcp.c:49:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_tcp.c:153:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_tcp.c:270:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[INET6_ADDRSTRLEN + sizeof("[]:65536")] = "";
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_udp.c:85:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_udp.c:206:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_udp.c:311:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[INET6_ADDRSTRLEN + sizeof("[]:65536")] = "";
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_udp_client.c:105:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->addr_remote, addr, addrlen);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:73:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        lockfile_fd = open(lockfile, O_RDWR | O_CREAT | O_TRUNC | O_CLOEXEC,
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:77:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        lockfile_fd = open(lockfile, O_RDWR | O_CREAT | O_TRUNC,
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:167:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(addr.sun_path + 1, path, strlen(path) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:178:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(addr.sun_path, path, strlen(path) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:250:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char str[sizeof(addr) + sizeof("abstract:")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:291:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:372:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[sizeof(addr) + sizeof("abstract:")] = "";
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_windows.c:56:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cstr[256], sstr[256];
data/efl-1.25.1/src/lib/ecore_con/efl_net_session-connman.c:565:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[128];
data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_tcp.c:68:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char str[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_tcp.c:78:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char str[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_udp.c:66:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->addr_remote, addr, addrlen);
data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_udp.c:206:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char str[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_udp.c:545:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       char buf[INET_ADDRSTRLEN + sizeof(":65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_udp.c:563:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_unix.c:57:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char str[sizeof(addr) + sizeof("abstract:")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_unix.c:70:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char str[sizeof(addr) + sizeof("abstract:")];
data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_windows.c:121:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[64];
data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_windows.c:875:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->send.bytes + pd->send.used, slice->mem, todo);
data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_conn-openssl.c:213:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char subject[4096], issuer[4096];
data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_conn-openssl.c:237:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char shared[8192];
data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_conn-openssl.c:323:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char vbuf[32];
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c:302:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char key[256], keyname[256], compose_buffer[256];
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_fb.c:61:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(cmd.handles, hdls, 4 * sizeof(hdls[0]));
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_fb.c:62:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(cmd.pitches, pitches, 4 * sizeof(pitches[0]));
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_fb.c:63:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(cmd.offsets, offsets, 4 * sizeof(offsets[0]));
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_fb.c:64:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(cmd.modifier, modifiers, 4 * sizeof(modifiers[0]));
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_launcher.c:148:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(device, flags | O_CLOEXEC);
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_launcher.c:182:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(device, flags | O_CLOEXEC);
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_logind.c:108:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[64];
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_output.c:163:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(output->edid.serial, "%lu", (unsigned long)serial);
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_output.c:547:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[DRM_CONNECTOR_NAME_LEN];
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_output.c:958:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dev->crtcs, res->crtcs, sizeof(unsigned int) * res->count_crtcs);
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_private.h:170:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char eisa[13];
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_private.h:171:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char monitor[13];
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_private.h:172:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char pnp[5];
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_private.h:173:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char serial[13];
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_sprites.c:74:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sprite->formats, p->formats,
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_tty.c:166:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tty[32] = "<stdin>";
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_tty.c:197:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        dev->tty.fd = open(tty, (O_RDWR | O_CLOEXEC | O_NONBLOCK));
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_device.c:190:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fp = fopen("/proc/sys/kernel/osrelease", "rb");
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_device.c:193:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buff[512];
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_outputs.c:176:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(output->edid.serial, "%lu", (unsigned long)serial);
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_outputs.c:287:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[DRM_CONNECTOR_NAME_LEN];
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_outputs.c:583:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(cstate, state, sizeof(Ecore_Drm2_Crtc_State));
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_outputs.c:612:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(cstate, state, sizeof(Ecore_Drm2_Connector_State));
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_outputs.c:641:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pstate, state, sizeof(Ecore_Drm2_Plane_State));
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_outputs.c:964:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(device->crtcs, res->crtcs, sizeof(uint32_t) * res->count_crtcs);
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_outputs.c:1064:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char fallback_blob[128];
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_private.h:224:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char eisa[13];
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_private.h:225:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char monitor[13];
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_private.h:226:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char pnp[5];
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_private.h:227:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char serial[13];
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:751:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(*value, extra_options, len);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:2217:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(*rotations, ee->prop.wm_rot.available_rots, sizeof(int) * ee->prop.wm_rot.count);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:2980:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:2987:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   _ecore_evas_fps_debug_fd = open(buf, O_CREAT | O_BINARY | O_TRUNC | O_RDWR, 0644);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:2991:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        _ecore_evas_fps_debug_fd = open(buf, O_CREAT | O_BINARY | O_TRUNC | O_RDWR, 0644);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:3034:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[4096];
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_ews.c:128:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (_ews_defaults_geo) _ews_x = atoi(p);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_ews.c:134:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (_ews_defaults_geo) _ews_y = atoi(p);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_ews.c:140:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (_ews_defaults_geo) _ews_w = atoi(p);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_ews.c:145:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (_ews_defaults_geo) _ews_h = atoi(p);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_module.c:45:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_module.c:68:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_module.c:107:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[PATH_MAX] = "";
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas_module.c:151:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *paths[2] = { NULL, NULL };
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb.c:50:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if ((!s) || (atoi(s) == 0))
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb.c:90:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if ((!s) || (atoi(s) == 0))
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb.c:130:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fb = open(s, O_RDWR);
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb.c:136:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char dev[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb.c:146:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fb = open(dev, O_RDWR);
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb.c:150:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
             fb = open(dev, O_RDWR);
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:14:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *_ecore_fb_li_kbd_syms[144 * 7] =
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:538:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((fd = open(dev, O_RDONLY, O_NONBLOCK)) < 0)
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:554:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(device->info.name, "Unknown");
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_ts.c:114:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   _ecore_fb_ts_fd = open("/dev/touchscreen/0", O_RDONLY);
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_vt.c:83:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_vt.c:91:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((_ecore_fb_vt_tty_fd = open(buf, O_RDWR)) < 0)
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_vt.c:165:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((_ecore_fb_vt_tty0_fd = open("/dev/tty0", O_RDONLY)) < 0)
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:55:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char f[MAX_PATH];
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:62:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(f, file, len + 1);
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:216:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:384:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ss[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:423:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[16384];
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:424:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char realpath1[PATH_MAX], realpath2[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:431:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f1 = fopen(src, "rb");
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:433:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f2 = fopen(dst, "wb");
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:451:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:556:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:597:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:720:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:823:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:892:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(file, path, (p - path));
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_inotify.c:179:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[16384];
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_inotify.c:213:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_poll.c:109:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_poll.c:222:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_poll.c:247:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_poll.c:293:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_win32.c:28:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                 buffer[ECORE_FILE_MONITOR_WIN32_BUFFER_SIZE];
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_win32.c:131:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                           filename[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_win32.c:156:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(wname, fni->FileName, fni->FileNameLength);
data/efl-1.25.1/src/lib/ecore_file/ecore_file_path.c:95:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char  buf[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_file/ecore_file_path.c:119:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char  buf[PATH_MAX], *dir, *exe;
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c:51:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX] = "";
data/efl-1.25.1/src/lib/ecore_imf/ecore_imf_module.c:71:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  const char *modules_one[2] = { NULL, NULL };
data/efl-1.25.1/src/lib/ecore_input/ecore_input_joystick.c:466:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ret = atoi(dev + plen);
data/efl-1.25.1/src/lib/ecore_input/ecore_input_joystick.c:509:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(devnode, O_RDONLY | O_NONBLOCK);
data/efl-1.25.1/src/lib/ecore_input/ecore_input_joystick.c:630:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[128];
data/efl-1.25.1/src/lib/ecore_input_evas/ecore_input_evas.c:233:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(eel->ev, e, sizeof (Ecore_Event_Mouse_Button));
data/efl-1.25.1/src/lib/ecore_input_evas/ecore_input_evas.c:833:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          _last_events_timeout = ((double) atoi(tmp)) / 60;
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:453:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[4096];
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:724:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[4096];
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:927:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char dat[sizeof(Ecore_Ipc_Msg_Head)];
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:1142:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char dat[sizeof(Ecore_Ipc_Msg_Head)];
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:1568:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(cl->buf + cl->buf_size, e->data, e->size);
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:1630:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(buf, cl->buf + offset + s, msg.size);
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:1679:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(buf, cl->buf + offset, cl->buf_size - offset);
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:1759:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(svr->buf + svr->buf_size, e->data, e->size);
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:1812:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(buf, svr->buf + offset + s, msg.size);
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:1875:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(buf, svr->buf + offset, svr->buf_size - offset);
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_dnd.c:686:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_dnd.c:719:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(event->data, buffer, len);
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:389:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     cursor_size = atoi(temp);
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:789:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char key[256], keyname[256], compose[256];
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_window.c:83:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          win->ivi_surface_id = atoi(env);
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_window.c:398:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char uuid[37];
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_window.c:1108:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char uuid_string[37];
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_window.c:1143:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char id[9];
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_clipboard.c:87:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(d, data, size);
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_clipboard.c:107:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(d, text16, size16);
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_clipboard.c:161:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char name[4096];
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_clipboard.c:210:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(data, d, *size);
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_cursor_x11.h:4:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mask_and[32 * 4];
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_cursor_x11.h:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mask_xor[32 * 4];
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd.c:25:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, data, size);
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd_data_object.cpp:28:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dest, source, len);
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:273:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char string[2] = { 0, 0 };
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:1377:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((char *)e->keyname, keyname, strlen(keyname));
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:1378:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((char *)e->key, key, strlen(key));
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:1381:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)e->compose, compose, strlen(compose));
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2.c:80:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[PATH_MAX];
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_buffer.c:617:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open("/dev/dri/renderD128", O_RDWR | O_CLOEXEC);
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_dnd.c:795:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[255];
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_dnd.c:811:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(((char*)buf->data) + old_len, buffer, len);
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:617:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char key[256] = "", keyname[256] = "", compose[256] = "";
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:1493:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (tmp) input->cursor.size = atoi(tmp);
data/efl-1.25.1/src/lib/ecore_x/Ecore_X.h:847:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char  b[20];
data/efl-1.25.1/src/lib/ecore_x/ecore_x.c:1933:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     keycode = atoi(key + 8);
data/efl-1.25.1/src/lib/ecore_x/ecore_x.c:2049:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     keycode = atoi(key + 8);
data/efl-1.25.1/src/lib/ecore_x/ecore_x.c:2197:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(xev.xclient.data.b, data, len);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_atoms.c:33:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     names[i] = (char *) atom_items[i].name;
data/efl-1.25.1/src/lib/ecore_x/ecore_x_dnd.c:117:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(mystr, data, size);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_dnd.c:130:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*data_ret, text_prop.value, bufsize);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_events.c:351:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char keyname_buffer[256];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_events.c:352:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char compose_buffer[256];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_events.c:597:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ev, xevent, sizeof(XEvent));
data/efl-1.25.1/src/lib/ecore_x/ecore_x_events.c:2462:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (data) memcpy(data, &(event->xcookie), sizeof(XGenericEventCookie));
data/efl-1.25.1/src/lib/ecore_x/ecore_x_icccm.c:479:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *list[1];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_icccm.c:898:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *list[1];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_image.c:359:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                 memcpy(p, sp, sbpl);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_keygrab.c:410:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(new_key_list, key_table->key_list, sizeof(int) * i);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_keygrab.c:415:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_key_list + i,
data/efl-1.25.1/src/lib/ecore_x/ecore_x_keygrab.c:446:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     keycode = atoi(key + 8);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_keygrab.c:523:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     keycode = atoi(key + 8);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:186:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ss[32], *buf, *t;
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:201:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(ss, "Desk-%u", i);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:210:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(buf + len, s, l);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:1677:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(info->buffer, data, 20);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:1720:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(info->buffer + info->length, data, 20);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:1769:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(str, prop_ret, num_ret);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:1870:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char value[1024];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:1959:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               info->timestamp = atoi(p + 5);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:1969:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          info->screen = atoi(value);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:1985:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          info->desktop = atoi(value);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:1989:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               info->timestamp = atoi(value);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:2006:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          info->silent = atoi(value);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:2062:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:2078:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:1052:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(&ret[nret], crtc->outputs,
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:2213:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(ret, info->name, s);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:2291:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(info, xgamma, sizeof(Ecore_X_Randr_Crtc_Gamma_Info));
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:2816:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(ret, prop, (nitems * sizeof(unsigned char)));
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:2898:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(ret, prop, (nitems * sizeof(Ecore_X_Randr_Output)));
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:2964:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(formats, info->values,
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:3033:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(props, info->values,
data/efl-1.25.1/src/lib/ecore_x/ecore_x_selection.c:158:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, data, size);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_selection.c:595:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(mystr, data, size);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_selection.c:606:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(str, text_prop.value, bufsize);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_selection.c:620:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*data_ret, text_prop.value, bufsize);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_test.c:28:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     keycode = atoi(key + 8);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_test.c:60:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     keycode = atoi(key + 8);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_test.c:93:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     keycode = atoi(key + 8);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_test.c:162:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     keycode = atoi(keyname + 8);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:475:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[1024];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:627:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:639:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen("/proc/sys/kernel/osrelease", "rb");
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:669:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   drm_fd = open(buf, O_RDWR | O_CLOEXEC);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_vsync.c:905:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[4096];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_window.c:299:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[MAXHOSTNAMELEN];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_window.c:300:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *hostname[1];
data/efl-1.25.1/src/lib/ecore_x/ecore_x_xi2.c:791:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char mask[4] = { 0 };
data/efl-1.25.1/src/lib/ecore_x/ecore_x_xi2.c:845:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char mask[4] = { 0 };
data/efl-1.25.1/src/lib/ecore_x/ecore_x_xi2.c:890:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char mask[4] = { 0 };
data/efl-1.25.1/src/lib/ecore_x/ecore_x_xi2.c:1049:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(d, data, num);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_xi2.c:1058:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(d, data, num * (fmt / 8));
data/efl-1.25.1/src/lib/ector/ector_renderer.c:68:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pd->m, m, sizeof (Eina_Matrix3));
data/efl-1.25.1/src/lib/ector/ector_renderer_gradient.c:25:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->colors, colors, length * sizeof(Efl_Gfx_Gradient_Stop));
data/efl-1.25.1/src/lib/ector/gl/ector_gl_shader.c:14:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *_shader_flags[SHADER_FLAG_COUNT] = {
data/efl-1.25.1/src/lib/ector/software/ector_software_buffer.c:215:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(map->ptr + k * dst_stride, pd->pixels.u8 + x + (k + y) * pd->stride, dst_stride);
data/efl-1.25.1/src/lib/ector/software/ector_software_buffer.c:276:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                 memcpy(pd->pixels.u8 + map->x + (k + map->y) * pd->stride,
data/efl-1.25.1/src/lib/ector/software/ector_software_rasterizer.c:768:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(lastspan,spans, count * sizeof(SW_FT_Span));
data/efl-1.25.1/src/lib/edje/Edje_Legacy.h:523:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *str[1]; /**< The message's @b array of string pointers */
data/efl-1.25.1/src/lib/edje/edje_cache.c:256:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/edje/edje_cache.c:430:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char out[PATH_MAX + PATH_MAX + 128];
data/efl-1.25.1/src/lib/edje/edje_cache.c:431:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char outdir[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_cache.c:468:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                  f = fopen(out, "wb");
data/efl-1.25.1/src/lib/edje/edje_calc.c:316:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ret, src, memsize);
data/efl-1.25.1/src/lib/edje/edje_calc.c:415:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(desc_rtl, src, memsize);
data/efl-1.25.1/src/lib/edje/edje_calc.c:610:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024] = "edje/images/";
data/efl-1.25.1/src/lib/edje/edje_calc.c:3272:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char src_key[32], dest_key[32];
data/efl-1.25.1/src/lib/edje/edje_calc.c:3905:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(p, s, sizeof(Edje_Calc_Params));
data/efl-1.25.1/src/lib/edje/edje_calc.c:3928:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(d, s->type.common, sizeof(*d));
data/efl-1.25.1/src/lib/edje/edje_calc.c:3940:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(d, s->type.text, sizeof(*d));
data/efl-1.25.1/src/lib/edje/edje_calc.c:4046:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char depends_path[PATH_MAX] = "";
data/efl-1.25.1/src/lib/edje/edje_calc.c:4661:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                     memcpy(&p3_write->light, &p1->ext->map->light, sizeof (p1->ext->map->light));
data/efl-1.25.1/src/lib/edje/edje_calc.c:4665:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                     memcpy(&p3_write->light, &p2->ext->map->light, sizeof (p2->ext->map->light));
data/efl-1.25.1/src/lib/edje/edje_calc.c:4677:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                     memcpy(&p3_write->persp, &p1->ext->map->persp, sizeof (p1->ext->map->persp));
data/efl-1.25.1/src/lib/edje/edje_calc.c:4681:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                     memcpy(&p3_write->persp, &p2->ext->map->persp, sizeof (p2->ext->map->persp));
data/efl-1.25.1/src/lib/edje/edje_callbacks.c:100:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/edje/edje_callbacks.c:169:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/edje/edje_callbacks.c:353:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/edje/edje_convert.c:116:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(edf->image_dir->entries + de->id,
data/efl-1.25.1/src/lib/edje/edje_convert.c:139:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(edf->image_dir->sets + ds->id,
data/efl-1.25.1/src/lib/edje/edje_edit.c:204:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char **keys, buf[64];
data/efl-1.25.1/src/lib/edje/edje_edit.c:528:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char entry[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_edit.c:1227:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sample[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_edit.c:1251:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(sample, "edje/sounds/0");
data/efl-1.25.1/src/lib/edje/edje_edit.c:1307:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char sample[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_edit.c:1604:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char snd_id_str[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_edit.c:1722:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/lib/edje/edje_edit.c:1922:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64], **keys;
data/efl-1.25.1/src/lib/edje/edje_edit.c:6174:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char state_name[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_edit.c:8627:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char entry[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_edit.c:8711:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char entry[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_edit.c:9814:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char entry[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_edit.c:9815:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char last_entry[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_edit.c:10244:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char entry[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_edit.c:10245:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char last_entry[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_edit.c:12433:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char embryo_cc_path[PATH_MAX] = "";
data/efl-1.25.1/src/lib/edje/edje_edit.c:12434:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char inc_path[PATH_MAX] = "";
data/efl-1.25.1/src/lib/edje/edje_edit.c:12435:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX + PATH_MAX + PATH_MAX + 128];
data/efl-1.25.1/src/lib/edje/edje_edit.c:13829:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char relative_str[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:13948:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char relative_str[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14095:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char border_scale_by_str[strlen("border_scale_by") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14199:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char relative[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14229:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char relative[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14379:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 char rot_x[strlen("x") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14388:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 char rot_y[strlen("y") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14397:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 char rot_z[strlen("z") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14542:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char relative[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14572:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char relative[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14663:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char align_str[strlen("align") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14757:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char align_str[strlen("align") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14947:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char align_str[strlen("align") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14964:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ellipsis_str[strlen("ellipsis") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:15762:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char state[512], *delim;
data/efl-1.25.1/src/lib/edje/edje_edit.c:16333:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/edje/edje_edit.c:16497:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/edje/edje_embryo.c:302:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   s = (char *)_edje_var_str_get(ed, (int)params[1]);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:335:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   s = (char *)_edje_var_str_get(ed, (int)params[1]);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:523:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   s = (char *)_edje_var_list_nth_str_get(ed, (int)params[1],
data/efl-1.25.1/src/lib/edje/edje_embryo.c:4027:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmp, eep.s, dst_len - 1);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:4128:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmp, eep.s, dst_len - 1);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:4684:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[128];
data/efl-1.25.1/src/lib/edje/edje_entry.c:383:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy((markup_text + 1), s, size);
data/efl-1.25.1/src/lib/edje/edje_entry.c:404:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy((markup_text + 2), s, size);
data/efl-1.25.1/src/lib/edje/edje_entry.c:416:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy((markup_text + 1), s, size);
data/efl-1.25.1/src/lib/edje/edje_legacy.c:710:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(new, rp->typedata.text->text, len_old);
data/efl-1.25.1/src/lib/edje/edje_legacy.c:711:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(new + len_old, text, len_added);
data/efl-1.25.1/src/lib/edje/edje_load.c:489:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sig[256];
data/efl-1.25.1/src/lib/edje/edje_load.c:545:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sig[256];
data/efl-1.25.1/src/lib/edje/edje_load.c:574:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sig[256];
data/efl-1.25.1/src/lib/edje/edje_load.c:771:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char lang[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_load.c:2562:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char new_src[4096];          /* XXX is this max reasonable? */
data/efl-1.25.1/src/lib/edje/edje_load.c:2619:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(new_src, ed->parent, length_parent);
data/efl-1.25.1/src/lib/edje/edje_load.c:2628:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(new_src + length_parent, name, length_index - 2);
data/efl-1.25.1/src/lib/edje/edje_load.c:2635:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(new_src + length_parent + 1, source, length_source + 1);
data/efl-1.25.1/src/lib/edje/edje_load.c:2659:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(tmp, alias, alias_length);
data/efl-1.25.1/src/lib/edje/edje_load.c:2661:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(tmp + alias_length + 1, new_src + length, origin - length + 1);
data/efl-1.25.1/src/lib/edje/edje_lua.c:2149:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/edje/edje_lua.c:2150:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf, "edje/images/%i", id);
data/efl-1.25.1/src/lib/edje/edje_lua2.c:498:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(*v, temp, len);
data/efl-1.25.1/src/lib/edje/edje_lua2.c:2863:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            char buf[32];
data/efl-1.25.1/src/lib/edje/edje_lua2.c:2869:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(buf, IMAGES, strlen(IMAGES));
data/efl-1.25.1/src/lib/edje/edje_lua2.c:3949:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/edje/edje_message_queue.c:954:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             if (s) self_feed_debug = atoi(s);
data/efl-1.25.1/src/lib/edje/edje_module.c:42:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp[PATH_MAX] = "";
data/efl-1.25.1/src/lib/edje/edje_module.c:88:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *paths[2] = { NULL, NULL };
data/efl-1.25.1/src/lib/edje/edje_multisense.c:75:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buffer, vf->data + vf->offset, count);
data/efl-1.25.1/src/lib/edje/edje_multisense.c:145:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char snd_id_str[255];
data/efl-1.25.1/src/lib/edje/edje_private.h:592:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                            fid[8+8+8+2];
data/efl-1.25.1/src/lib/edje/edje_program.c:33:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(aliased, alias, alien);
data/efl-1.25.1/src/lib/edje/edje_program.c:35:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(aliased + alien + 1, sig, nslen + 1);
data/efl-1.25.1/src/lib/edje/edje_program.c:59:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(tmp, idx + 1, end - idx - 1);
data/efl-1.25.1/src/lib/edje/edje_program.c:608:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/lib/edje/edje_program.c:1346:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/lib/edje/edje_program.c:1406:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(part, sig, length - 1);
data/efl-1.25.1/src/lib/edje/edje_program.c:2261:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              i = (param->s) ? atoi(param->s) : 0;
data/efl-1.25.1/src/lib/edje/edje_program.c:2307:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         static char s[64];
data/efl-1.25.1/src/lib/edje/edje_program.c:2333:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         static char s[64];
data/efl-1.25.1/src/lib/edje/edje_signal.c:80:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(result->free_cb, src->free_cb,
data/efl-1.25.1/src/lib/edje/edje_signal.c:459:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&m->matches[i], &m->matches[j], sizeof(Edje_Signal_Callback_Match));
data/efl-1.25.1/src/lib/edje/edje_text.c:50:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char p[PATH_MAX];
data/efl-1.25.1/src/lib/edje/edje_text.c:175:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(*free_later, new, font_len);
data/efl-1.25.1/src/lib/edje/edje_text.c:176:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(*free_later + font_len, base_style, style_len);
data/efl-1.25.1/src/lib/edje/edje_textblock_styles.c:113:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(ret, s1, len);
data/efl-1.25.1/src/lib/edje/edje_textblock_styles.c:167:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            char buffer[120];
data/efl-1.25.1/src/lib/edje/edje_textblock_styles.c:236:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char new_font[256] = {0,};
data/efl-1.25.1/src/lib/edje/edje_textblock_styles.c:245:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char new_font_size[32] = {0,};
data/efl-1.25.1/src/lib/edje/edje_util.c:333:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(loc, locale, length);
data/efl-1.25.1/src/lib/edje/edje_util.c:3456:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(l->name, name, name_len);
data/efl-1.25.1/src/lib/edje/edje_util.c:5695:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tmp, alias, alias_length);
data/efl-1.25.1/src/lib/edje/edje_var.c:437:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/edje/edje_var.c:445:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eet/Eet_private.h:149:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[name_size]; /* name string (variable length) and \0 terminated */
data/efl-1.25.1/src/lib/eet/Eet_private.h:187:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char signature[signature_length]; /* The signature. */
data/efl-1.25.1/src/lib/eet/Eet_private.h:188:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char x509[x509_length]; /* The public certificate. */
data/efl-1.25.1/src/lib/eet/eet_cipher.c:89:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pass[1024];
data/efl-1.25.1/src/lib/eet/eet_cipher.c:271:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *names[6] = {
data/efl-1.25.1/src/lib/eet/eet_cipher.c:284:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[33];
data/efl-1.25.1/src/lib/eet/eet_cipher.c:671:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&magic,    header, sizeof(int));
data/efl-1.25.1/src/lib/eet/eet_cipher.c:672:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&sign_len, header+1, sizeof(int));
data/efl-1.25.1/src/lib/eet/eet_cipher.c:673:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&cert_len, header+2, sizeof(int));
data/efl-1.25.1/src/lib/eet/eet_cipher.c:743:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*sha1, hash, datum.size);
data/efl-1.25.1/src/lib/eet/eet_cipher.c:763:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((char *)tmp, cert_der, cert_len);
data/efl-1.25.1/src/lib/eet/eet_cipher.c:879:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((char *)tmp, certificate, der_length);
data/efl-1.25.1/src/lib/eet/eet_connection.c:101:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)conn->buffer + conn->received, data, copy_size);
data/efl-1.25.1/src/lib/eet/eet_connection.c:140:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(message + 2, data, data_size);
data/efl-1.25.1/src/lib/eet/eet_data.c:217:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char data[1];
data/efl-1.25.1/src/lib/eet/eet_data.c:680:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, src, sizeof(short));
data/efl-1.25.1/src/lib/eet/eet_data.c:716:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, src, sizeof(int));
data/efl-1.25.1/src/lib/eet/eet_data.c:752:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, src, sizeof(unsigned long long));
data/efl-1.25.1/src/lib/eet/eet_data.c:865:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(d, s, len + 1);
data/efl-1.25.1/src/lib/eet/eet_data.c:1010:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/lib/eet/eet_data.c:1026:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(d, buf, len + 1);
data/efl-1.25.1/src/lib/eet/eet_data.c:1087:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/lib/eet/eet_data.c:1103:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(d, buf, len + 1);
data/efl-1.25.1/src/lib/eet/eet_data.c:1157:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/lib/eet/eet_data.c:1172:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(d, buf, len + 1);
data/efl-1.25.1/src/lib/eet/eet_data.c:1397:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tmp, int_data, int_size);
data/efl-1.25.1/src/lib/eet/eet_data.c:1398:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(((char*)tmp) + int_size, type_data, type_size);
data/efl-1.25.1/src/lib/eet/eet_data.c:1660:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(p + ds->pos, data, size);
data/efl-1.25.1/src/lib/eet/eet_data.c:1674:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[4] = "CHK";
data/efl-1.25.1/src/lib/eet/eet_data.c:3994:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(dst, &data_ret, subsize);
data/efl-1.25.1/src/lib/eet/eet_data.c:4450:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(evu->data, echnk->data, evu->size);
data/efl-1.25.1/src/lib/eet/eet_data.c:4613:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(data, data_ret, subtype->size);
data/efl-1.25.1/src/lib/eet/eet_image.c:272:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[JMSG_LENGTH_MAX];
data/efl-1.25.1/src/lib/eet/eet_image.c:284:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[JMSG_LENGTH_MAX];
data/efl-1.25.1/src/lib/eet/eet_image.c:299:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[JMSG_LENGTH_MAX];
data/efl-1.25.1/src/lib/eet/eet_image.c:676:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(d + 32, data, w * h * 4);
data/efl-1.25.1/src/lib/eet/eet_image.c:706:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(bigend_data, data, w * h * 4);
data/efl-1.25.1/src/lib/eet/eet_image.c:894:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(data, data8, len * 4);
data/efl-1.25.1/src/lib/eet/eet_image.c:1312:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(d + 12, d1, sz1);
data/efl-1.25.1/src/lib/eet/eet_image.c:1313:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(d + 12 + sz1, d2, sz2);
data/efl-1.25.1/src/lib/eet/eet_image.c:1706:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(header, data, 32);
data/efl-1.25.1/src/lib/eet/eet_image.c:1940:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(dst, src, row_stride * h);
data/efl-1.25.1/src/lib/eet/eet_image.c:1947:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(over, src, w * 4);
data/efl-1.25.1/src/lib/eet/eet_image.c:2024:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(header, data, 32);
data/efl-1.25.1/src/lib/eet/eet_lib.c:311:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char zeros[8] = { 0, 0, 0, 0, 0, 0, 0, 0 };
data/efl-1.25.1/src/lib/eet/eet_lib.c:329:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(ef->path, O_CREAT | O_TRUNC | O_RDWR | O_BINARY, S_IRUSR | S_IWUSR);
data/efl-1.25.1/src/lib/eet/eet_lib.c:877:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(efn->data, ef->data + efn->offset, efn->size);
data/efl-1.25.1/src/lib/eet/eet_lib.c:993:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(head, buffer, 3 * sizeof(int));
data/efl-1.25.1/src/lib/eet/eet_lib.c:1058:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(&tmp, Pointer + Index, sizeof(int)); \
data/efl-1.25.1/src/lib/eet/eet_lib.c:1207:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(data, ef->data + efn->offset, efn->size);
data/efl-1.25.1/src/lib/eet/eet_lib.c:1744:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096], *p, *end;
data/efl-1.25.1/src/lib/eet/eet_lib.c:1749:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(file, "rb");
data/efl-1.25.1/src/lib/eet/eet_node.c:431:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *eet_node_dump_g_name[6] = {
data/efl-1.25.1/src/lib/eet/eet_node.c:440:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *eet_node_dump_t_name[14][2] = {
data/efl-1.25.1/src/lib/eet/eet_node.c:528:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tbuf[256];
data/efl-1.25.1/src/lib/eet/eet_node.c:648:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char tbuf[256];
data/efl-1.25.1/src/lib/eeze/eeze_disk_libmount_new.c:439:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   _mountinfo = open("/proc/self/mountinfo", O_RDONLY, S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH);
data/efl-1.25.1/src/lib/eeze/eeze_disk_libmount_old.c:72:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024];
data/efl-1.25.1/src/lib/eeze/eeze_net.c:96:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   net->index = atoi(idx);
data/efl-1.25.1/src/lib/eeze/eeze_net.c:173:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ip[INET_ADDRSTRLEN];
data/efl-1.25.1/src/lib/eeze/eeze_net.c:175:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ip6[INET6_ADDRSTRLEN];
data/efl-1.25.1/src/lib/eeze/eeze_sensor.c:89:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(sens, obj, sizeof(Eeze_Sensor_Obj));
data/efl-1.25.1/src/lib/eeze/eeze_sensor.c:100:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/eeze/eeze_udev_find.c:308:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
             devcheck = open(udev_device_get_devnode(device), O_RDONLY);
data/efl-1.25.1/src/lib/eeze/eeze_udev_private.c:99:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/eeze/eeze_udev_syspath.c:218:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char val[16];
data/efl-1.25.1/src/lib/eeze/eeze_udev_syspath.c:221:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(val, "%f", value);
data/efl-1.25.1/src/lib/eeze/eeze_udev_syspath.c:386:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     ret = atoi(test);
data/efl-1.25.1/src/lib/eeze/eeze_udev_watch.c:144:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
           devcheck = open(udev_device_get_devnode(device), O_RDONLY);
data/efl-1.25.1/src/lib/efl/interfaces/efl_gfx_path.c:196:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->commands, commands, sizeof(Efl_Gfx_Path_Command) * cmds_length);
data/efl-1.25.1/src/lib/efl/interfaces/efl_gfx_path.c:197:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->points, points, sizeof(double) * pts_length);
data/efl-1.25.1/src/lib/efl/interfaces/efl_gfx_path.c:330:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(cmds, from_pd->commands,
data/efl-1.25.1/src/lib/efl/interfaces/efl_gfx_shape.c:221:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tmp, dash, length * sizeof (Efl_Gfx_Dash));
data/efl-1.25.1/src/lib/efl/interfaces/efl_io_buffer.c:282:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->bytes + write_pos, slice->mem, todo);
data/efl-1.25.1/src/lib/efl/interfaces/efl_io_queue.c:411:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->bytes + pd->position_write, slice->mem, todo);
data/efl-1.25.1/src/lib/efl/interfaces/efl_text_markup_util.c:290:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char utf8_escape[7]; /* Support up to 6 bytes utf8 */
data/efl-1.25.1/src/lib/efl/interfaces/efl_text_markup_util.c:291:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ustr[10];
data/efl-1.25.1/src/lib/efl/interfaces/efl_text_markup_util.c:308:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ustr, s, len);
data/efl-1.25.1/src/lib/efl/interfaces/efl_text_markup_util.c:391:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(ttag, tag_start, ttag_len);
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:1058:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[2048];
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:3030:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char *t, *types[eina_list_count(ds->mime_types) + 1];
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:3660:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(mem, s->kbd.keymap_str, s->kbd.keymap_str_size);
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:4266:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char *types[eina_array_count(arr) + 1];
data/efl-1.25.1/src/lib/efl_mono/efl_custom_exports_mono.c:153:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r, val, size);
data/efl-1.25.1/src/lib/efreet/efreet.c:280:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf_lang[18];
data/efl-1.25.1/src/lib/efreet/efreet.c:281:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[9];
data/efl-1.25.1/src/lib/efreet/efreet.c:291:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf_lang, buf, l1 - 1);
data/efl-1.25.1/src/lib/efreet/efreet.c:300:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf_lang + l1, buf, l2);
data/efl-1.25.1/src/lib/efreet/efreet.c:317:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(setting, p, len);
data/efl-1.25.1/src/lib/efreet/efreet.c:401:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(path, O_RDONLY);
data/efl-1.25.1/src/lib/efreet/efreet_base.c:258:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dir[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_base.c:294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_base.c:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sep[2] = {EFREET_PATH_SEP, '\0'};
data/efl-1.25.1/src/lib/efreet/efreet_base.c:477:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(env, e1, len);
data/efl-1.25.1/src/lib/efreet/efreet_base.c:511:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_base.c:547:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, eq, end - eq);
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:119:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:138:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        num = atoi(s);
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:144:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        num = atoi(s);
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:318:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:479:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char cache_file[PATH_MAX] = { '\0' };
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[PATH_MAX] = { '\0' };
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:514:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[PATH_MAX] = { '\0' };
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:545:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char test[4] = { 0x11, 0x22, 0x33, 0x44 };
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:555:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[64], *d;
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:623:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, digest, 5 * 4);
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:640:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char link[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:764:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[PATH_MAX] = { '\0' };
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:1340:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char nil[1] = { 0 };
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:1364:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char nil[1] = { 0 };
data/efl-1.25.1/src/lib/efreet/efreet_cache_private.h:73:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char      link_sha1[20];
data/efl-1.25.1/src/lib/efreet/efreet_desktop.c:598:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, string, len);
data/efl-1.25.1/src/lib/efreet/efreet_desktop.c:836:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char entry[4096];
data/efl-1.25.1/src/lib/efreet/efreet_desktop.c:941:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char entry[4096];
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:659:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:734:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char hostname[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:739:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmp, uri + 7, len2);
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:882:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[2];
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:387:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ico_path[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:461:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(t, tmp, len);
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:470:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                points[i] = atoi(s);
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:496:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(t, tmp, len);
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:510:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            point->x = atoi(s);
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:516:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            point->y = atoi(s);
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:663:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:744:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:127:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(header, head_start, len - 1);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:187:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(key, key_start, len - 1);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:200:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(value, value_start, len - 1);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:259:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(file, "wb");
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:326:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (str) return atoi(str);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:334:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[12];
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:362:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[512];
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:455:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:542:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char menu[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:660:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(path, "wb");
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:1363:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char file[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:1519:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX], *p = NULL;
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:1522:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char parent_path[PATH_MAX + PATH_MAX + 128];
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:1531:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, "applications", sizeof("applications"));
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:1545:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(p, "applications", sizeof("applications"));
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:1556:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p, parent->file.name, len2);
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:1690:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:1976:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (val) parent->inline_limit = atoi(val);
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:2035:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (val) layout->inline_limit = atoi(val);
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:2891:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(t, move->new_name, len);
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:2948:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, name, len);
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:3124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:3176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:3286:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:3780:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, path, len);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:170:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:466:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:646:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:762:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char parent[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:763:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char path[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:811:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:817:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (!(f = fopen(file, "rb"))) return NULL;
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:942:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char *val, buf[512];
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:949:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&buf, ptr, val - ptr);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:952:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             mime->priority = atoi(buf);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:956:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&buf, ptr, val - ptr);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:993:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                   entry->offset = atoi(ptr);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:1001:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                   memcpy(&tshort, ptr, sizeof(short));
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:1006:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                   memcpy(entry->value, ptr, entry->value_len);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:1013:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                   memcpy(entry->mask, ptr, entry->value_len);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:1019:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                   entry->word_size = atoi(ptr);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:1066:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                   entry->range_len = atoi(ptr);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:1078:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        entry->indent = atoi(ptr);
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX + PATH_MAX + 128];
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:113:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dest[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char times[64];
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:234:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = fopen(dest, "wb")))
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:262:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:273:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_uri.c:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char scheme[64], authority[_POSIX_HOST_NAME_MAX], path[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_uri.c:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dest[PATH_MAX * 3 + 4];
data/efl-1.25.1/src/lib/efreet/efreet_utils.c:128:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, path + len + 1, len2);
data/efl-1.25.1/src/lib/efreet/efreet_utils.c:478:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dbuf[PATH_MAX];
data/efl-1.25.1/src/lib/efreet/efreet_utils.c:506:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[256];
data/efl-1.25.1/src/lib/efreet/efreet_utils.c:535:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[256];
data/efl-1.25.1/src/lib/efreet/efreet_utils.c:564:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[256];
data/efl-1.25.1/src/lib/efreet/efreet_xml.c:100:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(file, O_RDONLY);
data/efl-1.25.1/src/lib/efreet/efreet_xml.c:271:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/efl-1.25.1/src/lib/efreet/efreet_xml.c:339:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, start, buf_size - 1);
data/efl-1.25.1/src/lib/efreet/efreet_xml.c:366:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[256];
data/efl-1.25.1/src/lib/efreet/efreet_xml.c:385:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, start, buf_size - 1);
data/efl-1.25.1/src/lib/efreet/efreet_xml.c:459:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, start, buf_size - 1);
data/efl-1.25.1/src/lib/eina/eina_abstract_content.c:324:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[128];
data/efl-1.25.1/src/lib/eina/eina_accessor.c:211:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(data, (char*) accessor->array + idx*accessor->step, accessor->step);
data/efl-1.25.1/src/lib/eina/eina_array.c:188:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ac, it, sizeof(Eina_Accessor_Array));
data/efl-1.25.1/src/lib/eina/eina_benchmark.c:240:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   main_script = fopen(buffer, "wb");
data/efl-1.25.1/src/lib/eina/eina_benchmark.c:305:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      current_data = fopen(buffer, "wb");
data/efl-1.25.1/src/lib/eina/eina_convert.c:364:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(des, "0x0p+0", 7);
data/efl-1.25.1/src/lib/eina/eina_counter.c:129:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((char *)counter->name, name, length);
data/efl-1.25.1/src/lib/eina/eina_cow.c:517:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(r, *data, cow->struct_size);
data/efl-1.25.1/src/lib/eina/eina_cpu.c:319:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     _cpu_count = atoi(getenv("EINA_CPU_FAKE"));
data/efl-1.25.1/src/lib/eina/eina_debug.c:197:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf + 0, &version, 4);
data/efl-1.25.1/src/lib/eina/eina_debug.c:198:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf + 4, &pid, 4);
data/efl-1.25.1/src/lib/eina/eina_debug.c:200:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf + 8, app_name, strlen(app_name) + 1);
data/efl-1.25.1/src/lib/eina/eina_debug.c:229:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(packet_buf, &size, 4);
data/efl-1.25.1/src/lib/eina/eina_debug.c:336:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&info_64, buffer, sizeof(uint64_t));
data/efl-1.25.1/src/lib/eina/eina_debug.c:392:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf, &info_64, sizeof(uint64_t));
data/efl-1.25.1/src/lib/eina/eina_debug.c:399:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf + size_curr, info->ops[count].opcode_name, len);
data/efl-1.25.1/src/lib/eina/eina_debug.c:501:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[sizeof(socket_unix.sun_path)];
data/efl-1.25.1/src/lib/eina/eina_debug.h:140:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(internal, tmp, sizeof(tmp)); \
data/efl-1.25.1/src/lib/eina/eina_debug_bt.c:377:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&time, buffer, 4);
data/efl-1.25.1/src/lib/eina/eina_debug_bt_file.c:86:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/eina/eina_debug_chunk.c:109:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newchunk, chunk1, chunk1_num);
data/efl-1.25.1/src/lib/eina/eina_debug_chunk.c:140:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newchunk, chunk2, chunk2_num);
data/efl-1.25.1/src/lib/eina/eina_debug_chunk.c:174:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newchunk, chunk3, chunk3_num);
data/efl-1.25.1/src/lib/eina/eina_debug_chunk.c:197:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char chunk1[8 * 1024];
data/efl-1.25.1/src/lib/eina/eina_debug_chunk.c:198:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char chunk2[4 * 1024];
data/efl-1.25.1/src/lib/eina/eina_debug_chunk.c:199:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char chunk3[128 * 1024];
data/efl-1.25.1/src/lib/eina/eina_debug_cpu.c:48:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256], path[256];
data/efl-1.25.1/src/lib/eina/eina_debug_cpu.c:206:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
             fd = open(buf, O_RDONLY);
data/efl-1.25.1/src/lib/eina/eina_debug_cpu.c:217:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                       freq = atoi(buf);
data/efl-1.25.1/src/lib/eina/eina_error.c:327:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[256] = "";
data/efl-1.25.1/src/lib/eina/eina_evlog.c:253:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(resp_buf, &ovf, sizeof(ovf));
data/efl-1.25.1/src/lib/eina/eina_evlog.c:254:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(resp_buf + sizeof(evlog->overflow), evlog->buf, evlog->top);
data/efl-1.25.1/src/lib/eina/eina_file.c:93:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dir[1];
data/efl-1.25.1/src/lib/eina/eina_file.c:161:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(name,                  it->dir,    it->length);
data/efl-1.25.1/src/lib/eina/eina_file.c:162:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(name + it->length,     "/",        1);
data/efl-1.25.1/src/lib/eina/eina_file.c:163:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(name + it->length + 1, dp->d_name, length + 1);
data/efl-1.25.1/src/lib/eina/eina_file.c:194:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dir[1];
data/efl-1.25.1/src/lib/eina/eina_file.c:221:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(it->info.path + it->info.name_start, dp->d_name, length);
data/efl-1.25.1/src/lib/eina/eina_file.c:534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cwd[PATH_MAX];
data/efl-1.25.1/src/lib/eina/eina_file.c:659:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(it->dir, dir, length + 1);
data/efl-1.25.1/src/lib/eina/eina_file.c:713:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(it->dir,       dir, length + 1);
data/efl-1.25.1/src/lib/eina/eina_file.c:716:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(it->info.path, dir, length);
data/efl-1.25.1/src/lib/eina/eina_file.c:773:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(it->dir,       dir, length + 1);
data/efl-1.25.1/src/lib/eina/eina_file.c:776:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(it->info.path, dir, length);
data/efl-1.25.1/src/lib/eina/eina_file.c:832:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
             fd = open(filename, O_RDONLY, S_IRWXU | S_IRWXG | S_IRWXO | O_CLOEXEC);
data/efl-1.25.1/src/lib/eina/eina_file.c:834:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
             fd = open(filename, O_RDONLY, S_IRWXU | S_IRWXG | S_IRWXO);
data/efl-1.25.1/src/lib/eina/eina_file.c:1279:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           d_name[4096];
data/efl-1.25.1/src/lib/eina/eina_file.c:1285:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           d_name[4096];
data/efl-1.25.1/src/lib/eina/eina_file.c:1297:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char  ____pad[4];
data/efl-1.25.1/src/lib/eina/eina_file.c:1298:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           d_name[4096];
data/efl-1.25.1/src/lib/eina/eina_file.c:1311:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           d_name[4096];
data/efl-1.25.1/src/lib/eina/eina_file.c:1326:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/eina/eina_file.c:1336:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   dirfd = open("/proc/self/fd", O_RDONLY | O_DIRECTORY);
data/efl-1.25.1/src/lib/eina/eina_file.c:1337:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (dirfd < 0) dirfd = open("/dev/fd", O_RDONLY | O_DIRECTORY);
data/efl-1.25.1/src/lib/eina/eina_file.c:1359:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             num = atoi(fname);
data/efl-1.25.1/src/lib/eina/eina_file.c:1393:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                  num = atoi(fname);
data/efl-1.25.1/src/lib/eina/eina_file.c:1440:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             num = atoi(fname);
data/efl-1.25.1/src/lib/eina/eina_file.c:1464:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                  num = atoi(fname);
data/efl-1.25.1/src/lib/eina/eina_file.h:198:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                 path[EINA_PATH_MAX]; /**< The path */
data/efl-1.25.1/src/lib/eina/eina_file_common.c:487:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)file->global_map, data, length);
data/efl-1.25.1/src/lib/eina/eina_file_common.c:965:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   s = open(src, O_RDONLY | O_BINARY);
data/efl-1.25.1/src/lib/eina/eina_file_common.c:971:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   d = open(dst, O_WRONLY | O_BINARY | O_CREAT | O_TRUNC, S_IRUSR | S_IWUSR);
data/efl-1.25.1/src/lib/eina/eina_file_common.c:999:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[PATH_MAX];
data/efl-1.25.1/src/lib/eina/eina_file_common.c:1040:11:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
     fd = mkstemp(buffer);
data/efl-1.25.1/src/lib/eina/eina_file_common.c:1058:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[PATH_MAX];
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:68:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char            dir[1];
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:82:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                  dir[1];
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:119:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:130:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf, dir, l);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:131:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf + l, "\\*.*", 5);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:214:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(name,                  it->dir, it->length);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:215:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(name + it->length,     "\\",    1);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:216:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(name + it->length + 1, cname,   length + 1);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:315:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(it->info.path + it->info.name_start, cname, length);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:427:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tmp + l + 1, path, len);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:574:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(it->dir, dir, length + 1);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:619:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(it->dir, dir, length + 1);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:622:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(it->info.path, dir, length);
data/efl-1.25.1/src/lib/eina/eina_freeq.c:388:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             v = atoi(s);
data/efl-1.25.1/src/lib/eina/eina_freeq.c:401:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (s) _eina_freeq_fillpat_max = atoi(s);
data/efl-1.25.1/src/lib/eina/eina_freeq.c:403:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (s) _eina_freeq_total_max = atoi(s);
data/efl-1.25.1/src/lib/eina/eina_freeq.c:405:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (s) _eina_freeq_mem_max = atoi(s) * 1024;
data/efl-1.25.1/src/lib/eina/eina_freeq.c:407:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (s) _eina_freeq_fillpat_val = atoi(s);
data/efl-1.25.1/src/lib/eina/eina_freeq.c:409:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (s) _eina_freeq_fillpat_freed_val = atoi(s);
data/efl-1.25.1/src/lib/eina/eina_hash.c:274:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)new_hash_element->tuple.key, key, alloc_length);
data/efl-1.25.1/src/lib/eina/eina_inarray.c:422:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(p, data, array->member_size);
data/efl-1.25.1/src/lib/eina/eina_inarray.c:566:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(p, data, sz);
data/efl-1.25.1/src/lib/eina/eina_inarray.c:603:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(p, data, array->member_size);
data/efl-1.25.1/src/lib/eina/eina_inarray.c:650:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmp, fwd, sz);
data/efl-1.25.1/src/lib/eina/eina_inarray.c:651:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(fwd, rev, sz);
data/efl-1.25.1/src/lib/eina/eina_inarray.c:652:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(rev, tmp, sz);
data/efl-1.25.1/src/lib/eina/eina_iterator.c:253:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(data, (void*) it->current, it->step);
data/efl-1.25.1/src/lib/eina/eina_list.c:420:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ac, list, sizeof(Eina_Accessor_List));
data/efl-1.25.1/src/lib/eina/eina_log.c:308:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[12];
data/efl-1.25.1/src/lib/eina/eina_log.c:333:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[12];
data/efl-1.25.1/src/lib/eina/eina_log.c:358:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[12];
data/efl-1.25.1/src/lib/eina/eina_log.c:1065:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)d,                          color, color_len);
data/efl-1.25.1/src/lib/eina/eina_log.c:1066:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)(d + color_len),            name,  name_len);
data/efl-1.25.1/src/lib/eina/eina_log.c:1067:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)(d + color_len + name_len), EINA_COLOR_RESET,
data/efl-1.25.1/src/lib/eina/eina_log.c:1069:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        ((char *)d)[color_len + name_len + strlen(EINA_COLOR_RESET)] = '\0';
data/efl-1.25.1/src/lib/eina/eina_log.c:1155:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)p->name, start, diff);
data/efl-1.25.1/src/lib/eina/eina_log.c:1202:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)p->name, start, diff);
data/efl-1.25.1/src/lib/eina/eina_log.c:1501:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     _backtrace_level = atoi(tmp);
data/efl-1.25.1/src/lib/eina/eina_log.c:1505:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      color_disable = atoi(tmp);
data/efl-1.25.1/src/lib/eina/eina_log.c:1548:54:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if ((tmp = getenv(EINA_LOG_ENV_FILE_DISABLE)) && (atoi(tmp) == 1))
data/efl-1.25.1/src/lib/eina/eina_log.c:1551:58:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if ((tmp = getenv(EINA_LOG_ENV_FUNCTION_DISABLE)) && (atoi(tmp) == 1))
data/efl-1.25.1/src/lib/eina/eina_log.c:1554:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if ((tmp = getenv(EINA_LOG_ENV_ABORT)) && (atoi(tmp) == 1))
data/efl-1.25.1/src/lib/eina/eina_log.c:1558:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      _abort_level_on_critical = atoi(tmp);
data/efl-1.25.1/src/lib/eina/eina_log.c:1564:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      _log_level = atoi(level);
data/efl-1.25.1/src/lib/eina/eina_log.c:1957:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pending->name, domain_name, namelen + 1);
data/efl-1.25.1/src/lib/eina/eina_main.c:322:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     _eina_threads_debug = atoi(getenv("EINA_DEBUG_THREADS"));
data/efl-1.25.1/src/lib/eina/eina_matrix.c:974:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&MATRIX_XX(m), v, sizeof(double) * 16);
data/efl-1.25.1/src/lib/eina/eina_matrix.c:980:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, src, sizeof(Eina_Matrix4));
data/efl-1.25.1/src/lib/eina/eina_matrix.c:1205:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&MATRIX_XX(m), v, sizeof(double) * 9);
data/efl-1.25.1/src/lib/eina/eina_matrix.c:1211:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, src, sizeof(Eina_Matrix3));
data/efl-1.25.1/src/lib/eina/eina_matrix.c:1362:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&MATRIX_XX(m), v, sizeof(double) * 4);
data/efl-1.25.1/src/lib/eina/eina_matrix.c:1368:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, src, sizeof(Eina_Matrix2));
data/efl-1.25.1/src/lib/eina/eina_mmap.c:202:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
             _eina_mmap_zero_fd = open("/dev/zero", O_RDWR | O_CLOEXEC);
data/efl-1.25.1/src/lib/eina/eina_mmap.c:206:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
             _eina_mmap_zero_fd = open("/dev/zero", O_RDWR);
data/efl-1.25.1/src/lib/eina/eina_module.c:87:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char file[1];
data/efl-1.25.1/src/lib/eina/eina_module.c:272:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((char *)m->file, file, len + 1);
data/efl-1.25.1/src/lib/eina/eina_module.c:428:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(path, eina_dl.dli_fname, l0 - l1);
data/efl-1.25.1/src/lib/eina/eina_module.c:430:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                     memcpy(path + l0 - l1, sub_dir, l2);
data/efl-1.25.1/src/lib/eina/eina_module.c:468:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(path,      env_dir, l1);
data/efl-1.25.1/src/lib/eina/eina_module.c:470:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(path + l1, sub_dir, l2);
data/efl-1.25.1/src/lib/eina/eina_module.c:540:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmp, eina_module_file_get(m), len + 1);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:147:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf + used + seplen, comp, complen);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:220:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/eina/eina_prefix.c:222:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen("/proc/self/maps", "rb");
data/efl-1.25.1/src/lib/eina/eina_prefix.c:232:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *p, mode[5] = "";
data/efl-1.25.1/src/lib/eina/eina_prefix.c:284:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX], buf2[PATH_MAX];
data/efl-1.25.1/src/lib/eina/eina_prefix.c:375:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char env[64];
data/efl-1.25.1/src/lib/eina/eina_prefix.c:416:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char env[32];
data/efl-1.25.1/src/lib/eina/eina_prefix.c:474:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *p, buf[4096], *tmp, *magic = NULL;
data/efl-1.25.1/src/lib/eina/eina_promise.c:241:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[128];
data/efl-1.25.1/src/lib/eina/eina_rbtree.c:433:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	 memcpy(q, node, sizeof(Eina_Rbtree));
data/efl-1.25.1/src/lib/eina/eina_share_common.c:390:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(node->str, str, slen);
data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c:545:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmpbuf, key, key_end - key);
data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c:549:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tval, value, value_end - value);
data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c:586:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(key, buf, sep - buf);
data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c:589:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(val, sep + 1, end - sep - 1);
data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c:594:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(key, buf, sep - buf);
data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c:597:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(val, sep + 1, next - sep - 1);
data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c:602:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(key, buf, next - buf);
data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c:767:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(n->data, content, length);
data/efl-1.25.1/src/lib/eina/eina_str.c:83:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *idx[256] = {NULL};
data/efl-1.25.1/src/lib/eina/eina_str.c:474:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, a, size - 1);
data/efl-1.25.1/src/lib/eina/eina_str.c:479:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, a, a_len);
data/efl-1.25.1/src/lib/eina/eina_str.c:493:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst + off, b, size - off - 1);
data/efl-1.25.1/src/lib/eina/eina_str.c:498:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst + off, b, b_len);
data/efl-1.25.1/src/lib/eina/eina_str.c:730:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ret, mem, size);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:163:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buffer, copy, buf->len);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:225:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((unsigned char *)buf->buf + (pos * csize), str, len * csize);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:487:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(((unsigned char *)(buf->buf)) + (buf->len * csize), str,
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:528:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(((unsigned char *)(buf->buf)) + (buf->len * csize), str,
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:566:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(((unsigned char *)(buf->buf)) + (buf->len * csize), str,
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:693:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(((unsigned char *)(buf->buf)) + ((buf->len)++ *csize), c, csize);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:758:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, buf->buf, buf->len);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:827:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, buf->buf, buf->len);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:961:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, buf->buf, buf->len);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:977:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(((unsigned char *)(buf->buf)) + pos, with, len2);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:1017:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, buf->buf, buf->len);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:1032:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(((unsigned char *)(buf->buf)) + pos, with, len2);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:1062:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, buf->buf, buf->len);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:1075:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(spos, with, len2);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:1104:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(((unsigned char *)(buf->buf)) + start,  tmp_buf + start_tmp,
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:1107:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(((unsigned char *)(buf->buf)) + pos, with, len2);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:1119:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(((unsigned char *)(buf->buf)) + start, tmp_buf + start_tmp,
data/efl-1.25.1/src/lib/eina/eina_stringshare.c:70:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char _eina_stringshare_single[512] = {
data/efl-1.25.1/src/lib/eina/eina_stringshare.c:252:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(snew, str, length);
data/efl-1.25.1/src/lib/eina/eina_thread.c:252:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[16];
data/efl-1.25.1/src/lib/eina/eina_unicode.c:122:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ustr, text, n * sizeof(Eina_Unicode));
data/efl-1.25.1/src/lib/eina/eina_util.c:63:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/lib/eina/eina_util.c:79:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char pwbuf[8129];
data/efl-1.25.1/src/lib/eina/eina_value.c:201:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:349:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:501:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:657:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:818:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:970:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:1128:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:1292:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:1462:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:1639:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:1822:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:1999:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:2185:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, mem, sizeof(const char *));
data/efl-1.25.1/src/lib/eina/eina_value.c:2600:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmem, &tmp, sizeof(tmp));
data/efl-1.25.1/src/lib/eina/eina_value.c:2631:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, mem, sizeof(Eina_Value_Array));
data/efl-1.25.1/src/lib/eina/eina_value.c:2924:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmem, &tmp, sizeof(tmp));
data/efl-1.25.1/src/lib/eina/eina_value.c:2945:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, mem, sizeof(Eina_Value_List));
data/efl-1.25.1/src/lib/eina/eina_value.c:3291:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmem, &tmp, sizeof(tmp));
data/efl-1.25.1/src/lib/eina/eina_value.c:3315:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, mem, sizeof(Eina_Value_Hash));
data/efl-1.25.1/src/lib/eina/eina_value.c:3489:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:3523:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, mem, sizeof(struct timeval));
data/efl-1.25.1/src/lib/eina/eina_value.c:3597:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, mem, type->value_size);
data/efl-1.25.1/src/lib/eina/eina_value.c:3612:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/eina/eina_value.c:3797:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(buf, str, desc.size);
data/efl-1.25.1/src/lib/eina/eina_value.c:3816:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(buf, a->array->members, desc.size);
data/efl-1.25.1/src/lib/eina/eina_value.c:3835:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(buf, b->memory, desc.size);
data/efl-1.25.1/src/lib/eina/eina_value.c:3887:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, mem, sizeof(Eina_Value_Blob));
data/efl-1.25.1/src/lib/eina/eina_value.c:4462:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmem, &tmp, sizeof(tmp));
data/efl-1.25.1/src/lib/eina/eina_value.c:4524:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, mem, sizeof(Eina_Value_Struct));
data/efl-1.25.1/src/lib/eina/eina_value.c:4747:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, mem, sizeof(Eina_Value_Union));
data/efl-1.25.1/src/lib/eina/eina_value.c:4842:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void*)c->memory, m, eina_file_size_get(f));
data/efl-1.25.1/src/lib/eina/eina_value.c:4892:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, mem, sizeof (Eina_File*));
data/efl-1.25.1/src/lib/eina/eina_value.c:4928:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, src, sizeof (Eina_Rectangle));
data/efl-1.25.1/src/lib/eina/eina_value.c:4952:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char str[1024];
data/efl-1.25.1/src/lib/eina/eina_value.c:5269:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ret, memory, size);
data/efl-1.25.1/src/lib/eina/eina_value.c:5499:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&_eina_value_empty, &empty, sizeof (empty));
data/efl-1.25.1/src/lib/eina/eina_value.c:5633:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(value, &_eina_value_empty, sizeof (_eina_value_empty));
data/efl-1.25.1/src/lib/eina/eina_value.c:5665:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(copy, &_eina_value_empty, sizeof (Eina_Value));
data/efl-1.25.1/src/lib/eina/eina_value.h:349:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char  buf[8];    /**< just hold 8-bytes, more goes into ptr */
data/efl-1.25.1/src/lib/eina/eina_value.h:3202:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(members, tmp, sizeof(tmp));                            \
data/efl-1.25.1/src/lib/eina/eina_vpath.c:52:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/eina/eina_vpath.c:127:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/eina/eina_vpath.c:327:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/eina/eina_vpath.c:368:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:18:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char home[PATH_MAX], *s;
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:34:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char _meta[PATH_MAX + 128]; \
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:43:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char _meta[PATH_MAX + 128]; \
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:70:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char _meta [PATH_MAX + 128]; \
data/efl-1.25.1/src/lib/eina/eina_vpath_xdg.c:78:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char _meta [PATH_MAX + 128]; \
data/efl-1.25.1/src/lib/eina/eina_xattr.c:66:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char xattr[1];
data/efl-1.25.1/src/lib/eina/eina_xattr.c:543:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[128];
data/efl-1.25.1/src/lib/eina/eina_xattr.c:576:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[10];
data/efl-1.25.1/src/lib/eina/eina_xattr.c:611:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   sfd = open(src, O_RDONLY);
data/efl-1.25.1/src/lib/eina/eina_xattr.c:614:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   dfd = open(dst, O_RDWR);
data/efl-1.25.1/src/lib/eio/efl_io_manager.c:414:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tmp, attr_data, size);
data/efl-1.25.1/src/lib/eio/efl_io_model.c:334:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->st, stat, sizeof (Eina_Stat));
data/efl-1.25.1/src/lib/eio/eio_dir.c:178:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(progress, &order->progress, sizeof (Eio_File_Progress));
data/efl-1.25.1/src/lib/eio/eio_dir.c:761:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&send_di->info, info, sizeof (Eina_File_Direct_Info));
data/efl-1.25.1/src/lib/eio/eio_file.c:182:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&send_di->info, info, sizeof (Eina_File_Direct_Info));
data/efl-1.25.1/src/lib/eio/eio_monitor_cocoa.c:195:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char realPath[PATH_MAX];
data/efl-1.25.1/src/lib/eio/eio_monitor_inotify.c:127:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buffer[16384];
data/efl-1.25.1/src/lib/eio/eio_monitor_kevent.c:274:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(monitor->path, O_RDONLY);
data/efl-1.25.1/src/lib/eio/eio_monitor_poll.c:178:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(cmp, &buffer, sizeof (Eina_Stat));
data/efl-1.25.1/src/lib/eio/eio_monitor_poll.c:192:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(cmp, &buffer, sizeof (Eina_Stat));
data/efl-1.25.1/src/lib/eio/eio_monitor_win32.c:40:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                 buffer[EIO_MONITOR_WIN32_BUFFER_SIZE];
data/efl-1.25.1/src/lib/eio/eio_monitor_win32.c:94:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(wname, fni->FileName, fni->FileNameLength);
data/efl-1.25.1/src/lib/eio/eio_monitor_win32.c:116:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char path[MAX_PATH];
data/efl-1.25.1/src/lib/eio/eio_monitor_win32.c:225:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(monitored, current, tmp - current);
data/efl-1.25.1/src/lib/eio/eio_monitor_win32.c:332:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[PATH_MAX];
data/efl-1.25.1/src/lib/eio/eio_xattr.c:494:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(async->todo.xdata.xattr_data, xattr_data, xattr_size);
data/efl-1.25.1/src/lib/eio/eio_xattr.c:529:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(async->todo.xstring.xattr_string, xattr_string, length);
data/efl-1.25.1/src/lib/eldbus/eldbus_core.c:412:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(d->key, key, keylen + 1);
data/efl-1.25.1/src/lib/eldbus/eldbus_message_from_eina_value.c:60:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(entry_sig, type+2, i);
data/efl-1.25.1/src/lib/eldbus/eldbus_message_from_eina_value.c:346:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(sub_sig, type+1, len);
data/efl-1.25.1/src/lib/eldbus/eldbus_message_to_eina_value.c:277:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[7];//arg000 + \0
data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c:96:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             int id = atoi(key + strlen(ARGX));
data/efl-1.25.1/src/lib/elementary/efl_datetime_manager.c:24:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char format[MAX_FORMAT_LEN];
data/efl-1.25.1/src/lib/elementary/efl_datetime_manager.c:104:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[MAX_FORMAT_LEN] = {0, };
data/efl-1.25.1/src/lib/elementary/efl_ui_alert_popup.c:18:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char PART_NAME_BUTTON_LAYOUT[EFL_UI_ALERT_POPUP_BUTTON_COUNT][15] =
data/efl-1.25.1/src/lib/elementary/efl_ui_alert_popup.c:23:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char BUTTON_SWALLOW_NAME[EFL_UI_ALERT_POPUP_BUTTON_COUNT][20] =
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:92:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:102:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:114:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:125:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:136:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:146:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:188:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char day_s[13], pname[18];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:284:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char part[16], day_s[16];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:657:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:675:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:726:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   sel_it = atoi(source);
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:833:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char pname[18];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar.c:1166:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pname[18];
data/efl-1.25.1/src/lib/elementary/efl_ui_calendar_private.h:24:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char              *weekdays[ELM_DAY_LAST];
data/efl-1.25.1/src/lib/elementary/efl_ui_check.c:211:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[1024];
data/efl-1.25.1/src/lib/elementary/efl_ui_check.c:224:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024];
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:171:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[BUFFER_SIZE];
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:182:31:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        if (tim.tm_hour < 12) strcpy(buf, "AM");
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:183:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        else strcpy(buf, "PM");
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:299:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[EFL_UI_CLOCK_MAX_FORMAT_LEN] = {0, };
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:337:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[BUFFER_SIZE];
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:368:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char separator[MAX_SEPARATOR_LEN];
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:430:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[BUFFER_SIZE];
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:557:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[BUFFER_SIZE];
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:677:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(t1, t2, sizeof(struct tm));
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:924:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[BUFFER_SIZE];
data/efl-1.25.1/src/lib/elementary/efl_ui_clock_private.h:36:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *PART_NAME_ARRAY[EFL_UI_CLOCK_TYPE_COUNT] = { "text",
data/efl-1.25.1/src/lib/elementary/efl_ui_clock_private.h:59:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                    fmt[EFL_UI_CLOCK_MAX_FIELD_FORMAT_LEN];
data/efl-1.25.1/src/lib/elementary/efl_ui_clock_private.h:89:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                      format[EFL_UI_CLOCK_MAX_FORMAT_LEN];
data/efl-1.25.1/src/lib/elementary/efl_ui_datepicker.c:71:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(t1, t2, (sizeof(int) * EFL_UI_DATEPICKER_TYPE_COUNT));
data/efl-1.25.1/src/lib/elementary/efl_ui_datepicker.c:157:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[FMT_LEN_MAX];
data/efl-1.25.1/src/lib/elementary/efl_ui_datepicker.c:263:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->min_date, new_time, (sizeof(int) * EFL_UI_DATEPICKER_TYPE_COUNT));
data/efl-1.25.1/src/lib/elementary/efl_ui_datepicker.c:288:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->max_date, new_time, (sizeof(int) * EFL_UI_DATEPICKER_TYPE_COUNT));
data/efl-1.25.1/src/lib/elementary/efl_ui_datepicker.c:313:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->cur_date, new_time, (sizeof(int) * EFL_UI_DATEPICKER_TYPE_COUNT));
data/efl-1.25.1/src/lib/elementary/efl_ui_format.c:305:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char result[16] = "0";
data/efl-1.25.1/src/lib/elementary/efl_ui_format.c:333:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   return atoi(result);
data/efl-1.25.1/src/lib/elementary/efl_ui_image_zoomable.c:2780:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_interactive.c:397:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy((markup_text + 1), s, size);
data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_interactive.c:417:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy((markup_text + 2), s, size);
data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_interactive.c:429:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy((markup_text + 1), s, size);
data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_interactive.c:2333:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(text, tmp, eina_file_size_get(f));
data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_interactive.c:2407:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(file, "wb");
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:254:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:264:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf2[1024];
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:335:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:474:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char prefix[4], state[10], signal[100];
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:578:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:2987:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char prefix[4], buf[128];
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:3299:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[63];
data/efl-1.25.1/src/lib/elementary/efl_ui_panel.c:218:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          sd->handler_size = (int) (elm_object_scale_get(obj)) * (atoi(handler_size));
data/efl-1.25.1/src/lib/elementary/efl_ui_panel.c:1059:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (open)
data/efl-1.25.1/src/lib/elementary/efl_ui_panel.c:1234:72:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               sd->handler_size = (int) (elm_object_scale_get(obj)) * (atoi(handler_size));
data/efl-1.25.1/src/lib/elementary/efl_ui_progressbar.c:560:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char signal_buffer[strlen(signal) + strlen("start") + 1];
data/efl-1.25.1/src/lib/elementary/efl_ui_progressbar.c:685:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char signal_name[32];
data/efl-1.25.1/src/lib/elementary/efl_ui_radio.c:49:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/efl_ui_spin_button.c:50:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32], fmt[32] = "%0.f";
data/efl-1.25.1/src/lib/elementary/efl_ui_spin_button.c:88:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(fmt, start, end - start);
data/efl-1.25.1/src/lib/elementary/efl_ui_tags.c:746:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (str) hpad = atoi(str);
data/efl-1.25.1/src/lib/elementary/efl_ui_tags.c:748:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (str) vpad = atoi(str);
data/efl-1.25.1/src/lib/elementary/efl_ui_textbox.c:1606:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        font_size_n = font_size ? atoi(font_size) : 0;
data/efl-1.25.1/src/lib/elementary/efl_ui_textbox.c:1634:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        font_size_n = font_size ? atoi(font_size) : 0;
data/efl-1.25.1/src/lib/elementary/efl_ui_timepicker.c:157:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[FMT_LEN_MAX];
data/efl-1.25.1/src/lib/elementary/efl_ui_timepicker.c:253:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->cur_time, new_time, (sizeof(int) * (EFL_UI_TIMEPICKER_TYPE_COUNT -1)));
data/efl-1.25.1/src/lib/elementary/efl_ui_widget.c:2755:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[100];
data/efl-1.25.1/src/lib/elementary/efl_ui_widget.c:5448:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char filter[1024];
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:509:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[128];
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:884:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             v = atoi(d);
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:2483:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   int v = version ? atoi(version) : 0;
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:3359:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[128];
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:4577:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:4585:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   v = version ? atoi(version) : 0;
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:4608:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   v = version ? atoi(version) : 0;
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:4621:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        v = version ? atoi(version) : 0;
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:6437:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   version = data ? atoi(data) : 0;
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:6843:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sd->wm_rot.rots, rots, cnt * sizeof(int));
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:6921:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*rotations, rots, cnt * sizeof(int));
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:7625:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             v = version ? atoi(version) : 0;
data/efl-1.25.1/src/lib/elementary/elc_combobox.c:88:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/lib/elementary/elc_combobox.c:261:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_combobox.c:387:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:334:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:517:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char **tok, buf[PATH_MAX * 3], *s;
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:596:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char temp_path[EINA_PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:1356:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char dir[PATH_MAX] = "";
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:1580:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:1758:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:2725:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:2769:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_fileselector_button.c:46:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/elementary/elc_fileselector_entry.c:127:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_hoversel.c:75:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/elementary/elc_hoversel.c:245:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/lib/elementary/elc_hoversel.c:271:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     max_size = (int)(atoi(max_size_str)
data/efl-1.25.1/src/lib/elementary/elc_hoversel.c:466:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/elementary/elc_hoversel.c:852:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry.c:88:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry.c:108:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (str) hpad = atoi(str);
data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry.c:110:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (str) vpad = atoi(str);
data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry.c:1416:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (str) hpad = atoi(str);
data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry.c:1418:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (str) vpad = atoi(str);
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:165:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:197:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:235:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:305:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:311:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "item/basic");
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:464:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:534:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:744:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:848:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1028];
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:954:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elc_player.c:154:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elc_player.c:176:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elc_player.c:450:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elc_player.c:481:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elc_player.c:580:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elc_popup.c:170:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            (int)(atoi(action_area_height)
data/efl-1.25.1/src/lib/elementary/elc_popup.c:376:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024], style[1024];
data/efl-1.25.1/src/lib/elementary/elc_popup.c:620:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/lib/elementary/elc_popup.c:660:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char style[1024];
data/efl-1.25.1/src/lib/elementary/elc_popup.c:681:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char style[1024];
data/efl-1.25.1/src/lib/elementary/elc_popup.c:941:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char style[1024];
data/efl-1.25.1/src/lib/elementary/elc_popup.c:1010:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char style[1024];
data/efl-1.25.1/src/lib/elementary/elc_popup.c:1193:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128], style[1024];
data/efl-1.25.1/src/lib/elementary/elc_popup.c:1264:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        i = atoi(part + 6) - 1;
data/efl-1.25.1/src/lib/elementary/elc_popup.c:1325:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        i = atoi(part + 6) - 1;
data/efl-1.25.1/src/lib/elementary/elc_popup.c:1393:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        i = atoi(part + 6) - 1;
data/efl-1.25.1/src/lib/elementary/elc_popup.c:1423:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char style[1024];
data/efl-1.25.1/src/lib/elementary/elm_atspi_bridge.c:2472:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char path[64];
data/efl-1.25.1/src/lib/elementary/elm_atspi_bridge.c:2793:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:148:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:158:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:170:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:181:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:192:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:202:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:242:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sign[64];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:260:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:331:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char day_s[13], pname[18];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:453:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char part[16], day_s[16];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:489:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char emission[32];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:511:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char emission[32];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:678:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char part[64];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:679:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char emission[64];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:735:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char left_buf[255] = { 0 };
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:736:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char right_buf[255] = { 0 };
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:1164:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:1182:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char emission[32];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:1241:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   sel_it = atoi(source);
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:1450:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char pname[18];
data/efl-1.25.1/src/lib/elementary/elm_calendar.c:1939:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pname[18];
data/efl-1.25.1/src/lib/elementary/elm_clock.c:447:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[16];
data/efl-1.25.1/src/lib/elementary/elm_cnp.c:55:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const unsigned char image_sequence[16];
data/efl-1.25.1/src/lib/elementary/elm_code_file.c:188:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen(tmp, "w");
data/efl-1.25.1/src/lib/elementary/elm_code_indent.c:72:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
             strcpy(buf + count, "  ");
data/efl-1.25.1/src/lib/elementary/elm_code_indent.c:90:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
               strcpy(buf + count, "//");
data/efl-1.25.1/src/lib/elementary/elm_code_indent.c:92:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
               strcpy(buf + count, " * ");
data/efl-1.25.1/src/lib/elementary/elm_code_indent.c:97:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
               strcpy(buf + count, "* ");
data/efl-1.25.1/src/lib/elementary/elm_code_widget.c:2466:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     _elm_code_widget_font_set(obj, pd, fontname, atoi(fontsize));
data/efl-1.25.1/src/lib/elementary/elm_code_widget_undo.c:35:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(copy, info, sizeof(*info));
data/efl-1.25.1/src/lib/elementary/elm_color_class.c:76:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/lib/elementary/elm_color_class.c:184:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(cc->current->color, color.color, sizeof(color.color));
data/efl-1.25.1/src/lib/elementary/elm_color_class.c:222:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cc->current, ecc, sizeof(Elm_Color_Overlay));
data/efl-1.25.1/src/lib/elementary/elm_color_class.c:605:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(cc->current->color, ecc->color, sizeof(ecc->color));
data/efl-1.25.1/src/lib/elementary/elm_color_class.c:695:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(ecc2, ecc, sizeof(Edje_Color_Class));
data/efl-1.25.1/src/lib/elementary/elm_color_class.c:824:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ecc2, ecc, sizeof(Edje_Color_Class));
data/efl-1.25.1/src/lib/elementary/elm_colorselector.c:1164:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char colorbar_name[128];
data/efl-1.25.1/src/lib/elementary/elm_colorselector.c:1165:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char colorbar_s[128];
data/efl-1.25.1/src/lib/elementary/elm_colorselector.c:1166:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_colorselector.c:1347:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (hpadstr) h_pad = atoi(hpadstr);
data/efl-1.25.1/src/lib/elementary/elm_colorselector.c:1350:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (vpadstr) v_pad = atoi(vpadstr);
data/efl-1.25.1/src/lib/elementary/elm_colorselector.c:1911:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (hpadstr) h_pad = atoi(hpadstr);
data/efl-1.25.1/src/lib/elementary/elm_colorselector.c:1913:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (vpadstr) v_pad = atoi(vpadstr);
data/efl-1.25.1/src/lib/elementary/elm_colorselector.c:2079:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char colorbar_s[128];
data/efl-1.25.1/src/lib/elementary/elm_config.c:761:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_config.c:791:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX], buf2[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_config.c:841:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int multiplier = atoi(params);
data/efl-1.25.1/src/lib/elementary/elm_config.c:921:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(cfg2, cfg, sizeof(Elm_Config));
data/efl-1.25.1/src/lib/elementary/elm_config.c:968:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_config.c:990:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_config.c:1386:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_config.c:1473:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX], *p;
data/efl-1.25.1/src/lib/elementary/elm_config.c:1516:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(_elm_profile, p, len);
data/efl-1.25.1/src/lib/elementary/elm_config.c:1670:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_config.c:1707:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_config.c:2123:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096], buf2[4096];
data/efl-1.25.1/src/lib/elementary/elm_config.c:2129:73:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (_running_in_tree || ((s = _getenv_once("ELM_PROFILE_NOSAVE")) && atoi(s)))
data/efl-1.25.1/src/lib/elementary/elm_config.c:2180:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096], buf2[4096];
data/efl-1.25.1/src/lib/elementary/elm_config.c:2223:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf + len, "base.cfg", sizeof("base.cfg"));
data/efl-1.25.1/src/lib/elementary/elm_config.c:2229:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf2, buf, len);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2230:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf2 + len, ".tmp", sizeof(".tmp"));
data/efl-1.25.1/src/lib/elementary/elm_config.c:2568:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->vsync = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2571:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->thumbscroll_enable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2573:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->thumbscroll_threshold = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2575:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->thumbscroll_hold_threshold = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2580:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->thumbscroll_flick_distance_tolerance = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2582:60:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->thumbscroll_momentum_distance_max = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2592:54:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->thumbscroll_bounce_enable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2632:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->scroll_smooth_start_enable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2634:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->scroll_animation_disable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2721:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->image_cache = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2724:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->font_cache = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2730:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->finger_size = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2733:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->password_show_last = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2759:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->cursor_engine_only = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2762:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->focus_highlight_enable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2765:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->focus_highlight_animate = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2768:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->focus_highlight_clip_disable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2771:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->focus_move_policy = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2774:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->item_select_on_focus_disable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2777:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->first_item_focus_on_first_focus_in = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2780:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->toolbar_shrink_mode = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2783:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->fileselector_expand_enable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2786:70:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->fileselector_double_tap_navigation_enable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2789:49:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->inwin_dialogs_enable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2792:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->icon_size = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2795:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->context_menu_disabled = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2803:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->effect_enable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2806:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->desktop_entry = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2811:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->selection_clear_enable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2835:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->disable_external_menu = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2838:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->clouseau_enable = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2840:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->magnifier_enable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2846:58:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->spinner_min_max_filter_enable = !!atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2856:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->popup_scrollable = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2859:49:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) _elm_config->glayer_tap_finger_size = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_config.c:3109:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX], buf2[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_config.c:4219:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_config.c:4387:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_config.c:4407:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_config.c:4591:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               *gl_depth = atoi(value_str);
data/efl-1.25.1/src/lib/elementary/elm_config.c:4599:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               *gl_stencil = atoi(value_str);
data/efl-1.25.1/src/lib/elementary/elm_conform.c:67:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_conform.c:78:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   tsx = atoi(token);
data/efl-1.25.1/src/lib/elementary/elm_conform.c:82:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   tsy = atoi(token);
data/efl-1.25.1/src/lib/elementary/elm_conform.c:86:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   tsw = atoi(token);
data/efl-1.25.1/src/lib/elementary/elm_conform.c:90:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   *sh = atoi(token);
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:53:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:120:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:155:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:223:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:229:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   day = atoi(item + (strlen(item) - 1));
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:318:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:322:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   day = atoi(item + (strlen(item) - 1));
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:397:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:515:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:576:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_dbus_menu.c:884:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[60];
data/efl-1.25.1/src/lib/elementary/elm_diskselector.c:149:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_diskselector.c:790:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (str) sd->len_threshold = MAX(0, atoi(str));
data/efl-1.25.1/src/lib/elementary/elm_diskselector.c:798:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             sd->display_item_num = MAX(DISPLAY_ITEM_NUM_MIN, atoi(str));
data/efl-1.25.1/src/lib/elementary/elm_diskselector.c:806:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (str) sd->minw = MAX(-1, atoi(str));
data/efl-1.25.1/src/lib/elementary/elm_diskselector.c:810:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (str) sd->minh = MAX(-1, atoi(str));
data/efl-1.25.1/src/lib/elementary/elm_entry.c:160:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(text, tmp, size);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:256:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(file, "wb");
data/efl-1.25.1/src/lib/elementary/elm_entry.c:375:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(lim2, lim, sizeof(Elm_Entry_Filter_Limit_Size));
data/efl-1.25.1/src/lib/elementary/elm_entry.c:702:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf, sel_data->data, sel_data->len);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:3306:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sd->append_text_left + sd->append_text_len, entry, len + 1);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:3318:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(sd->append_text_left, entry, len + 1);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:3432:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmpbuf, text, tlen);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:3435:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(tmpbuf + tlen, sd->append_text_left
data/efl-1.25.1/src/lib/elementary/elm_entry.c:4996:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(insert, *text + last_read_idx, size);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:5484:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(sd->input_panel_imdata, data, len);
data/efl-1.25.1/src/lib/elementary/elm_flipselector.c:368:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        sd->max_len = atoi(max_len);
data/efl-1.25.1/src/lib/elementary/elm_flipselector.c:460:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[16];
data/efl-1.25.1/src/lib/elementary/elm_font.c:155:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elm_gengrid.c:1015:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elm_gengrid.c:1058:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elm_gengrid.c:1133:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/elementary/elm_gengrid.c:1175:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:341:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:408:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:501:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:533:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:1406:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:1889:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (treesize) tsize = atoi(treesize);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:2067:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[126];
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:5353:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:5681:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:5745:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024], buf2[1024];
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:38:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(p, buf, size);
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:454:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, pe, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:465:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, pe, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:1588:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(p, pe, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3409:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&st->zoom_st, pe, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3410:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&st->zoom_st1, p, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3413:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&st->zoom_mv, pe, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3414:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&st->zoom_mv1, p, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3443:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&st->zoom_mv, pe, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3445:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&st->zoom_mv1, pe, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3656:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&st->rotate_st, pe, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3657:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&st->rotate_st1, p, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3660:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&st->rotate_mv, pe, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3661:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&st->rotate_mv1, p, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3682:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&st->rotate_mv, pe, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_gesture_layer.c:3684:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&st->rotate_mv1, pe, sizeof(Pointer_Event));
data/efl-1.25.1/src/lib/elementary/elm_hover.c:240:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_hover.c:288:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_hover.c:528:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_index.c:888:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_main.c:88:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elm_main.c:176:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *dirs[4] = { NULL, NULL, NULL, NULL };
data/efl-1.25.1/src/lib/elementary/elm_main.c:178:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_main.c:1049:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(p, "../lib/");
data/efl-1.25.1/src/lib/elementary/elm_main.c:1295:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cwd[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_main.c:1315:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_main.c:1915:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *f = fopen(file, "wb");
data/efl-1.25.1/src/lib/elementary/elm_map.c:75:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_map.c:90:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_map.c:105:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_map.c:120:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_map.c:135:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_map.c:152:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_map.c:211:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX + 256];
data/efl-1.25.1/src/lib/elementary/elm_map.c:213:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char search_url[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_map.c:387:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) *w = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_map.c:391:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) *h = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_map.c:688:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_map.c:689:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf2[PATH_MAX + 128];
data/efl-1.25.1/src/lib/elementary/elm_map.c:1783:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char text[32];
data/efl-1.25.1/src/lib/elementary/elm_map.c:2118:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) bubble->w = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_map.c:2123:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) h = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_map.c:2471:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/lib/elementary/elm_map.c:2532:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) ovl->w = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_map.c:2536:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) ovl->h = atoi(s);
data/efl-1.25.1/src/lib/elementary/elm_map.c:2937:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(r->fname, "rb");
data/efl-1.25.1/src/lib/elementary/elm_map.c:3029:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(n->fname, "rb");
data/efl-1.25.1/src/lib/elementary/elm_map.c:3070:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(nl->fname, "rb");
data/efl-1.25.1/src/lib/elementary/elm_map.c:3213:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_map.c:3232:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *fname, fname2[PATH_MAX + 128];
data/efl-1.25.1/src/lib/elementary/elm_map.c:3296:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *fname, fname2[PATH_MAX + 128];
data/efl-1.25.1/src/lib/elementary/elm_map.c:4257:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[4096];
data/efl-1.25.1/src/lib/elementary/elm_map.c:4647:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[PATH_MAX], fname2[PATH_MAX + 128];
data/efl-1.25.1/src/lib/elementary/elm_menu.c:86:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (item2->submenu.open) _submenu_hide(item2);
data/efl-1.25.1/src/lib/elementary/elm_menu.c:96:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (item->submenu.open) _submenu_hide(item);
data/efl-1.25.1/src/lib/elementary/elm_menu.c:194:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (item->submenu.open) _submenu_sizing_eval(item);
data/efl-1.25.1/src/lib/elementary/elm_menu.c:244:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (item->submenu.open) _submenu_sizing_eval(item);
data/efl-1.25.1/src/lib/elementary/elm_menu.c:256:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char style[1024];
data/efl-1.25.1/src/lib/elementary/elm_menu.c:422:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (item->submenu.open) _submenu_sizing_eval(item);
data/efl-1.25.1/src/lib/elementary/elm_menu.c:444:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (item2->submenu.open) _submenu_hide(item2);
data/efl-1.25.1/src/lib/elementary/elm_menu.c:487:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (!item->submenu.open) _submenu_open_cb(item, NULL, NULL, NULL);
data/efl-1.25.1/src/lib/elementary/elm_menu.c:524:46:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                  was_open |= item2->submenu.open;
data/efl-1.25.1/src/lib/elementary/elm_menu.c:545:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (item->submenu.open) _submenu_hide(item);
data/efl-1.25.1/src/lib/elementary/elm_menu.c:639:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char style[1024];
data/efl-1.25.1/src/lib/elementary/elm_menu.c:771:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char style[1024];
data/efl-1.25.1/src/lib/elementary/elm_menu.c:1117:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char icon_tmp[512];
data/efl-1.25.1/src/lib/elementary/elm_module.c:130:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_panel.c:237:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          sd->handler_size = (int) (elm_object_scale_get(obj)) * (atoi(handler_size));
data/efl-1.25.1/src/lib/elementary/elm_panel.c:1137:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (open)
data/efl-1.25.1/src/lib/elementary/elm_panel.c:1361:72:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               sd->handler_size = (int) (elm_object_scale_get(obj)) * (atoi(handler_size));
data/efl-1.25.1/src/lib/elementary/elm_photo.c:179:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[4096 + 7];
data/efl-1.25.1/src/lib/elementary/elm_prefs.c:233:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_prefs.c:300:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_prefs.c:336:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_prefs.c:518:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_prefs.c:1031:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_prefs_data.c:371:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bkp[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_prefs_data.c:512:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char bkp[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_prefs_data.c:665:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char key[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_prefs_data.c:734:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (value) memcpy(&(item->value), &tmp, sizeof(tmp));
data/efl-1.25.1/src/lib/elementary/elm_prefs_data.c:753:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char key[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_segment_control.c:375:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_segment_control.c:410:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_segment_control.c:426:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_slideshow.c:428:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_slideshow.c:446:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(buf, "elm,none,next");
data/efl-1.25.1/src/lib/elementary/elm_slideshow.c:452:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(buf,"none,next");
data/efl-1.25.1/src/lib/elementary/elm_slideshow.c:466:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_slideshow.c:484:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(buf, "elm,none,next");
data/efl-1.25.1/src/lib/elementary/elm_slideshow.c:490:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(buf,"none,next");
data/efl-1.25.1/src/lib/elementary/elm_slideshow.c:504:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_slideshow.c:522:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(buf, "elm,none,previous");
data/efl-1.25.1/src/lib/elementary/elm_slideshow.c:528:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(buf,"none,previous");
data/efl-1.25.1/src/lib/elementary/elm_slideshow.c:595:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:133:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32], fmt[32] = "%0.f";
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:173:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(fmt, start, end - start);
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:192:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:436:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char result[16] = "0";
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:460:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   return atoi(result);
data/efl-1.25.1/src/lib/elementary/elm_store.c:391:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(info->path, finf->path, pathsz);
data/efl-1.25.1/src/lib/elementary/elm_theme.c:68:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        v = atoi(version);
data/efl-1.25.1/src/lib/elementary/elm_theme.c:334:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf2[1024];
data/efl-1.25.1/src/lib/elementary/elm_theme.c:384:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf2[1024];
data/efl-1.25.1/src/lib/elementary/elm_theme.c:813:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_theme.c:898:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX], *file, *s, *th;
data/efl-1.25.1/src/lib/elementary/elm_theme.c:1065:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_theme.c:1079:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_toolbar.c:952:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char icon_str[512];
data/efl-1.25.1/src/lib/elementary/elm_toolbar.c:975:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     return (int)(atoi(icon_size) * efl_gfx_entity_scale_get(obj) * elm_config_scale_get()
data/efl-1.25.1/src/lib/elementary/elm_toolbar.c:1375:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[sizeof("elm,number,item,") + 4];
data/efl-1.25.1/src/lib/elementary/elm_toolbar.c:1582:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if ((s) && (atoi(s)))
data/efl-1.25.1/src/lib/elementary/elm_toolbar.c:1602:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elm_toolbar.c:1629:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/lib/elementary/elm_toolbar.c:1743:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[sizeof("elm,action,click,") + 1];
data/efl-1.25.1/src/lib/elementary/elm_toolbar.c:1745:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   button = atoi(emission + sizeof("mouse,clicked,") - 1);
data/efl-1.25.1/src/lib/elementary/elm_toolbar.c:2579:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if ((s) && (atoi(s)))
data/efl-1.25.1/src/lib/elementary/elm_web2.c:233:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elementary/elm_widget_calendar.h:44:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char              *weekdays[ELM_DAY_LAST];
data/efl-1.25.1/src/lib/elementary/elm_widget_menu.h:60:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      Eina_Bool    open : 1;
data/efl-1.25.1/src/lib/elementary/els_cursor.c:243:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (str) cur->hot_x = atoi(str);
data/efl-1.25.1/src/lib/elementary/els_cursor.c:245:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (str) cur->hot_y = atoi(str);
data/efl-1.25.1/src/lib/elementary/els_tooltip.c:485:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (str) tt->pad.x = atoi(str);
data/efl-1.25.1/src/lib/elementary/els_tooltip.c:487:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (str) tt->pad.y = atoi(str);
data/efl-1.25.1/src/lib/elementary/els_tooltip.c:490:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (str) tt->pad.bx = atoi(str);
data/efl-1.25.1/src/lib/elementary/els_tooltip.c:492:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (str) tt->pad.by = atoi(str);
data/efl-1.25.1/src/lib/elementary/els_tooltip.c:818:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[100] = {0};
data/efl-1.25.1/src/lib/elput/elput_evdev.c:637:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char key[256] = {0}, keyname[256] = {0}, compose[256] = {0};
data/efl-1.25.1/src/lib/elput/elput_input.c:39:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     return em->interface->open(em, path, flags);
data/efl-1.25.1/src/lib/elput/elput_manager.c:83:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (manager->interface->open)
data/efl-1.25.1/src/lib/elput/elput_manager.c:85:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        ret = manager->interface->open(manager, path, flags);
data/efl-1.25.1/src/lib/elput/elput_private.h:63:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   int (*open)(Elput_Manager *manager, const char *path, int flags);
data/efl-1.25.1/src/lib/elua/cache.c:49:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elua/cache.c:82:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elua/cache.c:85:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf2[PATH_MAX];
data/efl-1.25.1/src/lib/elua/cache.c:116:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[LUAL_BUFFERSIZE];
data/efl-1.25.1/src/lib/elua/elua.c:110:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *rf = fopen(fname, "r");
data/efl-1.25.1/src/lib/elua/elua.c:263:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char coredirbuf[PATH_MAX], moddirbuf[PATH_MAX], appsdirbuf[PATH_MAX];
data/efl-1.25.1/src/lib/elua/elua.c:524:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elua/elua.c:606:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/elua/elua.c:831:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *f = fopen(fname, "rb");
data/efl-1.25.1/src/lib/elua/io.c:14:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char         pbuf[PATH_MAX];
data/efl-1.25.1/src/lib/elua/io.c:17:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *testf = fopen(fname, "rb");
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:253:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(code_data, data, size);
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:288:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(file, "rb");
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:405:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ep->base, hdr, hdr->size);
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:474:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pname[sNAMEMAX + 1];
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:502:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pname[sNAMEMAX + 1];
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:543:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pname[sNAMEMAX + 1];
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:1077:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(addr, pr->cell_array,
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:1717:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data + (int)alt, data + (int)pri, (int)offs);
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:2000:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pr->cell_array, cells, num * sizeof(Embryo_Cell));
data/efl-1.25.1/src/lib/embryo/embryo_float.c:92:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/lib/embryo/embryo_private.h:283:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[sEXPMAX+1];
data/efl-1.25.1/src/lib/embryo/embryo_str.c:50:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   return (Embryo_Cell)atoi(s1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:327:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char fmt[10] = "";
data/efl-1.25.1/src/lib/embryo/embryo_str.c:328:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char tmp[256] = "";
data/efl-1.25.1/src/lib/embryo/embryo_str.c:331:43:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                        if (s1[i] == 'i') strcpy(fmt, "%i");
data/efl-1.25.1/src/lib/embryo/embryo_str.c:333:27:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                          strcpy(fmt, "%d");
data/efl-1.25.1/src/lib/embryo/embryo_str.c:335:27:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                          strcpy(fmt, "%x");
data/efl-1.25.1/src/lib/embryo/embryo_str.c:337:27:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                          strcpy(fmt, "%08x");
data/efl-1.25.1/src/lib/embryo/embryo_str.c:355:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char tmp[256] = "";
data/efl-1.25.1/src/lib/embryo/embryo_time.c:95:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *tz, prevtz[128] = {0};
data/efl-1.25.1/src/lib/emile/emile_base64.c:36:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char inarr[3], outarr[4];
data/efl-1.25.1/src/lib/emile/emile_base64.c:103:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char inarr[4], outarr[3];
data/efl-1.25.1/src/lib/emile/emile_cipher.c:17:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
emile_binbuf_hmac_sha1(const char *key EINA_UNUSED,
data/efl-1.25.1/src/lib/emile/emile_cipher.c:20:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char digest[20] EINA_UNUSED)
data/efl-1.25.1/src/lib/emile/emile_cipher.c:26:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
emile_binbuf_sha1(const Eina_Binbuf * data, unsigned char digest[20])
data/efl-1.25.1/src/lib/emile/emile_cipher.h:105:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EAPI Eina_Bool emile_binbuf_hmac_sha1(const char *key, unsigned int key_len, const Eina_Binbuf * data, unsigned char digest[20]);
data/efl-1.25.1/src/lib/emile/emile_cipher.h:105:113:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EAPI Eina_Bool emile_binbuf_hmac_sha1(const char *key, unsigned int key_len, const Eina_Binbuf * data, unsigned char digest[20]);
data/efl-1.25.1/src/lib/emile/emile_cipher.h:107:69:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EAPI Eina_Bool emile_binbuf_sha1(const Eina_Binbuf * data, unsigned char digest[20]);
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:116:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(res, hash, hlen);
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:124:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
emile_binbuf_hmac_sha1(const char *key,
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:127:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char digest[20])
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:157:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(res, hash, hlen);
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:165:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
emile_binbuf_sha1(const Eina_Binbuf * data, unsigned char digest[20])
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:180:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iv[MAX_IV_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:181:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char ik[MAX_KEY_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:182:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key_material[MAX_IV_LEN + MAX_KEY_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:208:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(iv, key_material, MAX_IV_LEN);
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:209:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ik, key_material + MAX_IV_LEN, MAX_KEY_LEN);
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:284:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char ik[MAX_KEY_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:285:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iv[MAX_IV_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:286:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key_material[MAX_KEY_LEN + MAX_IV_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:310:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(iv, key_material, MAX_IV_LEN);
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:311:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ik, key_material + MAX_IV_LEN, MAX_KEY_LEN);
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:59:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
emile_binbuf_hmac_sha1(const char *key,
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:62:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char digest[20])
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:72:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
emile_binbuf_sha1(const Eina_Binbuf * data, unsigned char digest[20])
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:108:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iv[MAX_IV_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:109:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char ik[MAX_KEY_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:110:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key_material[MAX_IV_LEN + MAX_KEY_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:137:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(iv, key_material, MAX_IV_LEN);
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:138:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ik, key_material + MAX_IV_LEN, MAX_KEY_LEN);
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:156:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buffer + 1,
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:222:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char ik[MAX_KEY_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:223:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char iv[MAX_IV_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:224:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char key_material[MAX_KEY_LEN + MAX_IV_LEN];
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:248:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(iv, key_material, MAX_IV_LEN);
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:249:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ik, key_material + MAX_IV_LEN, MAX_KEY_LEN);
data/efl-1.25.1/src/lib/emile/emile_cipher_openssl.c:565:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char log[4096];
data/efl-1.25.1/src/lib/emile/emile_image.c:619:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                  memcpy(&p[current_etc.x - 1 + (current_etc.y - 1 + k) * master.w],
data/efl-1.25.1/src/lib/emile/emile_image.c:639:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(&p_etc[(current_etc.x / 4) * etc_block_size + (current_etc.y / 4) * etc_width],
data/efl-1.25.1/src/lib/emile/emile_image.c:645:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(&p_etc[(current_etc.x / 4) * etc_block_size + (current_etc.y / 4) * etc_width + plane * alpha_offset],
data/efl-1.25.1/src/lib/emile/emile_image.c:698:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[JMSG_LENGTH_MAX];
data/efl-1.25.1/src/lib/emile/emile_image.c:714:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[JMSG_LENGTH_MAX];
data/efl-1.25.1/src/lib/emile/emile_image.c:740:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[JMSG_LENGTH_MAX];
data/efl-1.25.1/src/lib/emile/emile_image.c:887:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char orientation[2];  //orientation tag
data/efl-1.25.1/src/lib/emile/emile_main.c:128:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char digest[20];
data/efl-1.25.1/src/lib/emile/emile_main.c:129:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tab[4];
data/efl-1.25.1/src/lib/emile/emile_main.c:157:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, salt, salt_len);
data/efl-1.25.1/src/lib/emile/emile_main.c:158:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf + salt_len, tab, 4);
data/efl-1.25.1/src/lib/emile/emile_main.c:163:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, digest, tmp_len);
data/efl-1.25.1/src/lib/emotion/emotion_main.c:144:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[PATH_MAX];
data/efl-1.25.1/src/lib/emotion/emotion_modules.c:54:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/emotion/emotion_smart.c:118:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   Eina_Bool open : 1;
data/efl-1.25.1/src/lib/emotion/emotion_smart.c:276:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          sd->module_options.no_video = !!atoi(val);
data/efl-1.25.1/src/lib/emotion/emotion_smart.c:287:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          sd->module_options.no_audio = !!atoi(val);
data/efl-1.25.1/src/lib/emotion/emotion_smart.c:368:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   return sd->open && sd->loaded;
data/efl-1.25.1/src/lib/emotion/emotion_smart.c:664:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (!sd->open)
data/efl-1.25.1/src/lib/emotion/emotion_smart.c:688:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (!sd->open)
data/efl-1.25.1/src/lib/emotion/emotion_smart.c:741:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (!sd->open)
data/efl-1.25.1/src/lib/emotion/emotion_webcam.c:74:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(ew->filename, O_RDONLY);
data/efl-1.25.1/src/lib/eo/Eo.h:2194:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(internal, tmp, sizeof(tmp)); \
data/efl-1.25.1/src/lib/eo/eo.c:253:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dest->funcs, src->funcs, sizeof(op_type_funcs) * src->count);
data/efl-1.25.1/src/lib/eo/eo.c:1547:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        if (psize > 0) memcpy(ptr, _eo_classes, psize);
data/efl-1.25.1/src/lib/eo/eo.c:3161:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(current->bt, bt, size * sizeof(void *));
data/efl-1.25.1/src/lib/eo/eo.c:3223:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(entry->bt, bt, size * sizeof(void *));
data/efl-1.25.1/src/lib/eo/eo.c:3330:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        _eo_log_objs_backtrace = atoi(s);
data/efl-1.25.1/src/lib/eo/eo.c:3683:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/efl-1.25.1/src/lib/eo/eo_base_class.c:2617:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&pending->desc, &desc, sizeof(Efl_Future_Cb_Desc));
data/efl-1.25.1/src/lib/eo/eo_ptr_indirection.c:40:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tbuf[128];
data/efl-1.25.1/src/lib/eolian/database_class_api.c:210:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/lib/eolian/database_event_api.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  buf[512];
data/efl-1.25.1/src/lib/eolian/database_expr.c:25:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf, str, sizeof(str) - 1); \
data/efl-1.25.1/src/lib/eolian/database_expr.c:57:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/lib/eolian/database_expr.c:58:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ebuf[256];
data/efl-1.25.1/src/lib/eolian/database_expr.c:59:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tbuf[128];
data/efl-1.25.1/src/lib/eolian/database_expr.c:70:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512];
data/efl-1.25.1/src/lib/eolian/database_expr.c:110:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[512 + 128];
data/efl-1.25.1/src/lib/eolian/database_expr.c:111:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tbuf[256];
data/efl-1.25.1/src/lib/eolian/database_expr.c:112:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ebuf[256];
data/efl-1.25.1/src/lib/eolian/database_function_api.c:87:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tbuf[512];
data/efl-1.25.1/src/lib/eolian/database_validate.c:834:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(clbuf, impl->base.name, imlen + 1);
data/efl-1.25.1/src/lib/eolian/database_validate.c:1188:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cnbuf, ctor->base.name, ldot - ctor->base.name);
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:149:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(buf, ls->t.value.s, strlen(ls->t.value.s) + 1);
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:276:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf, cname, clen);
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:285:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf + clen, ".eo", sizeof(".eo"));
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:310:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf, ls->stream, rlen);
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:1247:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:1266:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, "<eof>", 6);
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:1272:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buf, "char(%d)", token);
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:1274:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buf, "%c", token);
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:1285:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, v, strlen(v) + 1);
data/efl-1.25.1/src/lib/eolian/eo_parser.c:34:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char  buf[256 + 128];
data/efl-1.25.1/src/lib/eolian/eo_parser.c:35:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tbuf[256];
data/efl-1.25.1/src/lib/eolian/eo_parser.c:89:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char  buf[256 + 256 + 128];
data/efl-1.25.1/src/lib/eolian/eo_parser.c:90:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char tbuf[256];
data/efl-1.25.1/src/lib/eolian/eo_parser.c:91:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char vbuf[256];
data/efl-1.25.1/src/lib/eolian/eo_parser.c:167:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256 + 128], fbuf[256] = { '\0' };
data/efl-1.25.1/src/lib/eolian/eo_parser.c:1619:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ebuf[PATH_MAX];
data/efl-1.25.1/src/lib/eolian/eo_parser.c:1993:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ebuf[PATH_MAX];
data/efl-1.25.1/src/lib/eolian/eo_parser.c:2090:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ebuf[PATH_MAX];
data/efl-1.25.1/src/lib/eolian/eo_parser.c:2153:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ebuf[PATH_MAX];
data/efl-1.25.1/src/lib/eolian/eo_parser.c:2183:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ebuf[PATH_MAX];
data/efl-1.25.1/src/lib/eolian/eo_parser.c:2370:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           char errbuf[PATH_MAX];
data/efl-1.25.1/src/lib/eolian/eolian_database.c:119:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(it->curp, obj->name, nstrl);
data/efl-1.25.1/src/lib/eolian/eolian_database.c:474:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ename, tok->text + 1, elen);
data/efl-1.25.1/src/lib/eolian/eolian_database.c:480:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(name, tok->text, nlen);
data/efl-1.25.1/src/lib/eolian_cxx/grammar/klass_def.hpp:977:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char typenam[2] = { 0, };
data/efl-1.25.1/src/lib/eolian_cxx/grammar/klass_def.hpp:999:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char typenam[2] = { 0, };
data/efl-1.25.1/src/lib/eolian_cxx/grammar/namespace.hpp:39:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         const char open[] = " { ";
data/efl-1.25.1/src/lib/eolian_cxx/grammar/namespace.hpp:42:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         std::copy(open, &open[0] + sizeof(open)-1, sink);
data/efl-1.25.1/src/lib/eolian_cxx/grammar/namespace.hpp:42:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         std::copy(open, &open[0] + sizeof(open)-1, sink);
data/efl-1.25.1/src/lib/eolian_cxx/grammar/namespace.hpp:42:44:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         std::copy(open, &open[0] + sizeof(open)-1, sink);
data/efl-1.25.1/src/lib/ephysics/ephysics_world.cpp:834:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   file = fopen(path, "wb");
data/efl-1.25.1/src/lib/ethumb/ethumb.c:150:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ethumb/ethumb.c:229:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ethumb/ethumb.c:878:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ACCEPTABLE_URI_CHARS[96] = {
data/efl-1.25.1/src/lib/ethumb/ethumb.c:898:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char md5out[(2 * MD5_HASHBYTES) + 1];
data/efl-1.25.1/src/lib/ethumb/ethumb.c:899:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char hash[MD5_HASHBYTES];
data/efl-1.25.1/src/lib/ethumb/ethumb.c:933:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(uri, "file://", sizeof("file://"));
data/efl-1.25.1/src/lib/ethumb/ethumb.c:992:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ethumb/ethumb.c:1024:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/ethumb/ethumb.c:1246:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ext[PATH_MAX];
data/efl-1.25.1/src/lib/ethumb/ethumb.c:1310:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *dname, *buf, flags[256];
data/efl-1.25.1/src/lib/ethumb/ethumb.c:1338:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(&(buf[len]), "/.tmp.");
data/efl-1.25.1/src/lib/ethumb/ethumb.c:1684:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(r, e, sizeof (Ethumb));
data/efl-1.25.1/src/lib/ethumb/md5.c:84:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(p, buf, len);
data/efl-1.25.1/src/lib/ethumb/md5.c:87:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, buf, t);
data/efl-1.25.1/src/lib/ethumb/md5.c:96:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->in.s, buf, 64);
data/efl-1.25.1/src/lib/ethumb/md5.c:105:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->in.s, buf, len);
data/efl-1.25.1/src/lib/ethumb/md5.c:112:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void MD5Final(unsigned char digest[16], MD5_CTX *ctx)
data/efl-1.25.1/src/lib/ethumb/md5.c:149:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(digest, ctx->buf, 16);
data/efl-1.25.1/src/lib/ethumb/md5.h:14:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     unsigned char s[64];
data/efl-1.25.1/src/lib/ethumb/md5.h:21:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern void   MD5Final(unsigned char digest[MD5_HASHBYTES], MD5_CTX *context);
data/efl-1.25.1/src/lib/evas/Evas_Loader.h:101:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int (*open)(Evas_Module *);
data/efl-1.25.1/src/lib/evas/cache/evas_cache_image.c:715:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(hkey, "//@/", 4);
data/efl-1.25.1/src/lib/evas/cache/evas_cache_image.c:788:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(hkey + size, "//://", 5);
data/efl-1.25.1/src/lib/evas/cache/evas_cache_image.c:791:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(hkey + size, ckey, key_length);
data/efl-1.25.1/src/lib/evas/cache/evas_cache_image.c:879:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(hkey, file, file_length);
data/efl-1.25.1/src/lib/evas/cache/evas_cache_image.c:881:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(hkey + size, "//://", 5);
data/efl-1.25.1/src/lib/evas/cache/evas_cache_image.c:884:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(hkey + size, ckey, key_length);
data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_gradient.c:23:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pd->colors, colors, length * sizeof(Efl_Gfx_Gradient_Stop));
data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_node.c:63:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pd->m, m, sizeof (Eina_Matrix3));
data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_node.c:698:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        if (nd->m) memcpy(nd->m, pd->m, sizeof(Eina_Matrix3));
data/efl-1.25.1/src/lib/evas/canvas/efl_gfx_vg_value_provider.c:48:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pd->m, m, sizeof (Eina_Matrix4));
data/efl-1.25.1/src/lib/evas/canvas/efl_input_focus.c:91:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ev, pd, sizeof(*ev));
data/efl-1.25.1/src/lib/evas/canvas/efl_input_hold.c:118:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ev, pd, sizeof(*ev));
data/efl-1.25.1/src/lib/evas/canvas/efl_input_key.c:162:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ev, pd, sizeof(*ev));
data/efl-1.25.1/src/lib/evas/canvas/efl_input_pointer.c:127:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ev, pd, sizeof(*ev));
data/efl-1.25.1/src/lib/evas/canvas/evas_callbacks.c:27:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(internals,                                             \
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:60:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int evas_object_text_font_string_parse(char *buffer, char dest[14][256]);
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:60:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int evas_object_text_font_string_parse(char *buffer, char dest[14][256]);
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:563:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(new, fdesc, sizeof(*new));
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:767:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char fake_name[PATH_MAX];
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:835:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char fake_name[PATH_MAX];
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1135:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char file_path[PATH_MAX];
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1176:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char font_prop[14][256];
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1250:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char file_path[PATH_MAX];
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1253:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp2[PATH_MAX];
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1269:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(file_path, "rb");
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1273:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fname[4096], fdef[4096];
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1279:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char font_prop[14][256];
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1328:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(file_path, "rb");
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1331:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fname[4096], fdef[4096];
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1400:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
evas_object_text_font_string_parse(char *buffer, char dest[14][256])
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1400:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
evas_object_text_font_string_parse(char *buffer, char dest[14][256])
data/efl-1.25.1/src/lib/evas/canvas/evas_main.c:161:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         lockmax = atoi(getenv("EVAS_LOCK_DEBUG"));
data/efl-1.25.1/src/lib/evas/canvas/evas_map.c:205:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(dst->points, src->points, src->count * sizeof(Evas_Map_Point));
data/efl-1.25.1/src/lib/evas/canvas/evas_map.c:218:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(copy->points, orig->points, orig->count * sizeof(Evas_Map_Point));
data/efl-1.25.1/src/lib/evas/canvas/evas_object_smart.c:1591:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (cur_bounding_box) memcpy(cur_bounding_box,
data/efl-1.25.1/src/lib/evas/canvas/evas_object_smart.c:1594:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (prev_bounding_box) memcpy(prev_bounding_box,
data/efl-1.25.1/src/lib/evas/canvas/evas_object_table.c:807:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cols, c->sizes.h, size);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_table.c:830:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(rows, c->sizes.v, size);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_text.c:1773:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char vals[5][5] =
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:439:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fit_style[256];
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:1875:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        fmt->tabstops = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:1891:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        fmt->linesize = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:1936:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        fmt->linegap = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2143:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        fmt->underline_dash_width = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2158:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        fmt->underline_dash_gap = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2187:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        fmt->tabstops = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2192:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        fmt->linesize = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2213:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        fmt->linegap = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2300:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        fmt->underline_dash_width = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2305:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        fmt->underline_dash_gap = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2393:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        v = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2870:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               fmt->margin.l += atoi(&(param[1]));
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2872:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               fmt->margin.l -= atoi(&(param[1]));
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2874:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               fmt->margin.l = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2900:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               fmt->margin.r += atoi(&(param[1]));
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2902:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               fmt->margin.r -= atoi(&(param[1]));
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:2904:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               fmt->margin.r = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3063:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 char font_param[strlen(font_prefix) + (equal - param)];
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3069:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 char val[tend - equal];
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3086:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        size = atoi(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3229:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char       stack[ALLOCATOR_SIZE];
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3263:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(allocator->stack, str, size);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3287:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(allocator->heap, str, size);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3791:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(fmt2, fmt, sizeof(Evas_Object_Textblock_Format));
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3808:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(fmt2->gfx_filter, fmt->gfx_filter, sizeof(*fmt->gfx_filter));
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:8591:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char utf8_escape[7]; /* Support up to 6 bytes utf8 */
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:8592:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ustr[10];
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:8609:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ustr, s, len);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:8845:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(ttag, tag_start, ttag_len);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:9169:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(ttag, tag_start, ttag_len);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:11882:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       char tmp[format_len + 1];
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:14507:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char shorttext[48];
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:14515:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(shorttext + 37, "\xe2\x80\xa6"); /* HORIZONTAL ELLIPSIS */
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:14821:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char vals[5][5] =
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:15931:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char font_size[24];
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:18011:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(fc->p_size_array,p_size_array,sizeof(unsigned int) * size_array_len);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:18033:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p_size_array,fc->p_size_array,sizeof(unsigned int)* num);
data/efl-1.25.1/src/lib/evas/canvas/evas_render.c:51:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        dbf = fopen("EVAS-RENDER-DEBUG.log", "wb");
data/efl-1.25.1/src/lib/evas/canvas/evas_render.c:60:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char __tmpbuf[4096]; int __tmpi; \
data/efl-1.25.1/src/lib/evas/canvas/evas_render.c:73:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char __tmpbuf[4096]; int __tmpi; \
data/efl-1.25.1/src/lib/evas/canvas/evas_render.c:3425:49:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (getenv("EVAS_PREPARE")) prepare = !!atoi(getenv("EVAS_PREPARE"));
data/efl-1.25.1/src/lib/evas/canvas/evas_smart.c:115:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(((char *)sc) + off, ((char *)parent_sc) + off, parent_sc_size - off);
data/efl-1.25.1/src/lib/evas/common/evas_blit_main.c:245:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, len * sizeof(DATA32));
data/efl-1.25.1/src/lib/evas/common/evas_convert_yuv.c:148:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char _clip_lut[1024];
data/efl-1.25.1/src/lib/evas/common/evas_draw_main.c:25:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(rects2->rects, rects->rects, sz);
data/efl-1.25.1/src/lib/evas/common/evas_draw_main.c:186:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dc2, dc, sizeof(RGBA_Draw_Context));
data/efl-1.25.1/src/lib/evas/common/evas_font.h:259:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      const char *prop[14];
data/efl-1.25.1/src/lib/evas/common/evas_font_compress.c:220:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, scratch, total);
data/efl-1.25.1/src/lib/evas/common/evas_font_load.c:147:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(fs->data, data, data_size);
data/efl-1.25.1/src/lib/evas/common/evas_font_load.c:331:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fake_name[PATH_MAX];
data/efl-1.25.1/src/lib/evas/common/evas_font_main.c:51:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          dpi_h = dpi_v = atoi(s);
data/efl-1.25.1/src/lib/evas/common/evas_image_data.c:80:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(dst->image.data, image_data, w * h * sizeof(DATA32));
data/efl-1.25.1/src/lib/evas/common/evas_image_data.c:85:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(dst->image.data8, image_data, w * h * sizeof(DATA16));
data/efl-1.25.1/src/lib/evas/common/evas_image_data.c:90:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(dst->image.data8, image_data, w * h * sizeof(DATA8));
data/efl-1.25.1/src/lib/evas/common/evas_image_data.c:99:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(dst->cs.data,  image_data, dst->cache_entry.h * sizeof(unsigned char*) * 2);
data/efl-1.25.1/src/lib/evas/common/evas_image_load.c:482:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ie->content, &property.content, sizeof (Eina_Rectangle));
data/efl-1.25.1/src/lib/evas/common/evas_image_main.c:107:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        evas_image_no_mmap = s && (atoi(s));
data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c:123:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) max_cache_size = atoi(s) * 1024;
data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c:125:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) max_dimension = atoi(s);
data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c:127:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) max_flop_count = atoi(s);
data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c:129:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) max_scale_items = atoi(s);
data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c:131:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) min_scale_uses = atoi(s);
data/efl-1.25.1/src/lib/evas/common/evas_map_image_internal.c:182:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(spans, &ms->spans[ystart - ms->ystart],
data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_pixel_.c:5:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(d, s, l * sizeof(DATA32));
data/efl-1.25.1/src/lib/evas/common/evas_op_copy/op_copy_pixel_neon.c:8:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(d, s, l * sizeof(DATA32));
data/efl-1.25.1/src/lib/evas/common/evas_pipe.c:54:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&(op->context), dc, sizeof(RGBA_Draw_Context));
data/efl-1.25.1/src/lib/evas/common/evas_pipe.c:58:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(op->context.cutout.rects, dc->cutout.rects, sizeof(Cutout_Rect) * op->context.cutout.active);
data/efl-1.25.1/src/lib/evas/common/evas_pipe.c:291:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&(context), &(op->context), sizeof(RGBA_Draw_Context));
data/efl-1.25.1/src/lib/evas/common/evas_pipe.c:339:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&(context), &(op->context), sizeof(RGBA_Draw_Context));
data/efl-1.25.1/src/lib/evas/common/evas_pipe.c:388:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&(context), &(op->context), sizeof(RGBA_Draw_Context));
data/efl-1.25.1/src/lib/evas/common/evas_pipe.c:440:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&(context), &(op->context), sizeof(RGBA_Draw_Context));
data/efl-1.25.1/src/lib/evas/common/evas_pipe.c:516:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&(context), &(op->context), sizeof(RGBA_Draw_Context));
data/efl-1.25.1/src/lib/evas/common/evas_pipe.c:613:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&(context), &(op->context), sizeof(RGBA_Draw_Context));
data/efl-1.25.1/src/lib/evas/common/evas_pipe.c:626:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&(context), &(op->context), sizeof(RGBA_Draw_Context));
data/efl-1.25.1/src/lib/evas/common/evas_text_utils.c:743:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, src, sizeof(Evas_Text_Props));
data/efl-1.25.1/src/lib/evas/common/evas_text_utils.c:1428:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char color_name[0xFF] = {0};
data/efl-1.25.1/src/lib/evas/common/language/evas_bidi_utils.c:486:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(emb_lvl, props->embedding_levels,
data/efl-1.25.1/src/lib/evas/common/language/evas_language_utils.c:50:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char lang[6]; /* FIXME: Maximum length I know about */
data/efl-1.25.1/src/lib/evas/common/language/evas_language_utils.c:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char lang_full[32];
data/efl-1.25.1/src/lib/evas/common/language/evas_script_table.h:17:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char _evas_script_fast_table[EVAS_SCRIPT_DIRECT_TABLE_LIMIT] = {
data/efl-1.25.1/src/lib/evas/file/evas_module.c:149:14:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
             strcat(path, "/evas/modules");
data/efl-1.25.1/src/lib/evas/file/evas_module.c:448:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/lib/evas/file/evas_module.c:566:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[PATH_MAX];
data/efl-1.25.1/src/lib/evas/file/evas_module.c:610:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char subsystem[PATH_MAX];
data/efl-1.25.1/src/lib/evas/file/evas_module.c:675:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (!em->definition->func.open(em)) return 0;
data/efl-1.25.1/src/lib/evas/file/evas_path.c:142:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX], *buf2;
data/efl-1.25.1/src/lib/evas/filters/evas_filter.c:1395:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(copy, curve, 256 * sizeof(DATA8));
data/efl-1.25.1/src/lib/evas/filters/evas_filter.c:1681:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->target.map, map, len);
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:745:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "__buffer_%02d", ++pgm->last_bufid);
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:778:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bufname[64];
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:858:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char bufname[64] = {0};
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:1343:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(param->value.special.data, values, sizeof(values));
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:2349:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[PATH_MAX];
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:2362:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*code, map, sz);
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:2409:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char name[64];
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:3059:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&pgm->state, state, sizeof(Efl_Canvas_Filter_State));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_rotate.c:191:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(&pd->rotate_st, p2, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_rotate.c:192:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(&pd->rotate_st1, p1, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_rotate.c:194:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(&pd->rotate_mv, p2, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_rotate.c:195:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(&pd->rotate_mv1, p1, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_rotate.c:209:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(&pd->rotate_mv, p2, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_rotate.c:211:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(&pd->rotate_mv1, p2, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_zoom.c:159:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(&pd->zoom_st, p2, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_zoom.c:160:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(&pd->zoom_st1, p1, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_zoom.c:162:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(&pd->zoom_mv, p2, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_zoom.c:163:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(&pd->zoom_mv1, p1, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_zoom.c:184:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(&pd->zoom_mv, p2, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/gesture/efl_canvas_gesture_recognizer_zoom.c:186:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(&pd->zoom_mv1, p2, sizeof(Efl_Gesture_Touch_Point_Data));
data/efl-1.25.1/src/lib/evas/include/evas_mmx.h:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			b[8];	/* 8 Byte (8-bit) values */
data/efl-1.25.1/src/lib/evas/include/evas_mmx.h:92:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		ub[8];	/* 8 Unsigned Byte */
data/efl-1.25.1/src/lib/evas/include/evas_private.h:170:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char buf[1024]; snprintf(buf, sizeof(buf), "Calling legacy API on EO object '%s' is not permitted!", efl_class_name_get(_o->object)); \
data/efl-1.25.1/src/lib/evas/include/evas_private.h:179:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char buf[1024]; snprintf(buf, sizeof(buf), "Calling legacy API on EO object '%s' is not permitted!", efl_class_name_get(_o->object)); \
data/efl-1.25.1/src/lib/evas/main.c:28:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int dbgshow = atoi(tmp);
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:35:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(_dl_err, desc, l1);
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:36:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(_dl_err + l1, str, l2);
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:178:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _dli_fname[MAX_PATH];
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:179:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _dli_sname[MAX_PATH]; /* a symbol should have at most 255 char */
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:190:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR tpath[PATH_MAX];
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:249:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(_dli_fname, path, length + 1);
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:292:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tmp, addresses, ied->NumberOfFunctions * sizeof(DWORD));
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:324:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(_dli_sname, name, length + 1);
data/efl-1.25.1/src/lib/evil/evil_langinfo.c:38:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
             strcpy(result, "cp");
data/efl-1.25.1/src/lib/evil/evil_locale.c:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _evil_locale_buf[18];
data/efl-1.25.1/src/lib/evil/evil_locale.c:40:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[9];
data/efl-1.25.1/src/lib/evil/evil_locale.c:57:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(_evil_locale_buf, buf, l1 - 1);
data/efl-1.25.1/src/lib/evil/evil_locale.c:64:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(_evil_locale_buf + l1, buf, l2);
data/efl-1.25.1/src/lib/evil/evil_time.c:81:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *day[7] =
data/efl-1.25.1/src/lib/evil/evil_time.c:86:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *abday[7] =
data/efl-1.25.1/src/lib/evil/evil_time.c:91:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *mon[12] =
data/efl-1.25.1/src/lib/evil/evil_time.c:97:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *abmon[12] =
data/efl-1.25.1/src/lib/evil/evil_time.c:103:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *am_pm[2] =
data/efl-1.25.1/src/lib/evil/evil_time.c:115:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const nast[5] = {
data/efl-1.25.1/src/lib/evil/evil_time.c:119:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const nadt[5] = {
data/efl-1.25.1/src/lib/evil/evil_util.c:27:12:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
   wsize = MultiByteToWideChar(CP_ACP, 0, text, (int)strlen(text) + 1, NULL, 0);
data/efl-1.25.1/src/lib/evil/evil_util.c:38:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
     if (!MultiByteToWideChar(CP_ACP, 0, text, (int)strlen(text) + 1, wtext, wsize))
data/efl-1.25.1/src/lib/evil/evil_util.c:120:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
   size16 = MultiByteToWideChar(CP_UTF8, flag, text, -1, NULL, 0);
data/efl-1.25.1/src/lib/evil/evil_util.c:129:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
     if (!MultiByteToWideChar(CP_UTF8, flag, text, -1, text16, size16))
data/efl-1.25.1/src/modules/ecore/system/systemd/ecore_system_systemd.c:152:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024], *value, *type;
data/efl-1.25.1/src/modules/ecore/system/upower/ecore_system_upower.c:258:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(version[i]) > standard[i])
data/efl-1.25.1/src/modules/ecore/system/upower/ecore_system_upower.c:263:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        else if (atoi(version[i]) < standard[i])
data/efl-1.25.1/src/modules/ecore_buffer/shm/ecore_buffer_shm.c:98:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(b->file, O_RDWR | O_BINARY | O_CLOEXEC);
data/efl-1.25.1/src/modules/ecore_buffer/x11_dri2/ecore_buffer_x11_dri2.c:251:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open (device_name, O_RDWR);
data/efl-1.25.1/src/modules/ecore_evas/engines/drm/ecore_evas_drm.c:961:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if ((num) && (!atoi(num)))
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:1020:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                   memcpy(ipc, e->data, sizeof(Ipc_Data_Update));
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:2003:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                ee->prop.profile.available_list[i] = (char *)eina_stringshare_add(plist[i]);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn_buf.c:23:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char file[PATH_MAX];
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn_buf.c:186:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   b->lockfd = open(b->lock, O_RDWR | O_BINARY);
data/efl-1.25.1/src/modules/ecore_evas/engines/fb/ecore_evas_fb.c:232:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   always_ts = s ? atoi(s) : 0;
data/efl-1.25.1/src/modules/ecore_evas/engines/wayland/ecore_evas_wayland_common.c:1047:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/modules/ecore_evas/engines/wayland/ecore_evas_wayland_common.c:1595:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(ee->prop.wm_rot.available_rots, rots, sizeof(int) * count);
data/efl-1.25.1/src/modules/ecore_evas/engines/wayland/ecore_evas_wayland_common.c:2481:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *tmp_array[eina_array_count(available_types) + 1];
data/efl-1.25.1/src/modules/ecore_evas/engines/wayland/ecore_evas_wayland_common.c:2904:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *tmp_array[eina_array_count(available_types) + 1];
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:1740:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          first_map_bug = atoi(bug);
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:3369:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               ee->prop.profile.available_list[i] = (char *)eina_stringshare_add(plist[i]);
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:3631:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(ee->prop.wm_rot.available_rots, rots, sizeof(int) * count);
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:4905:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               redraw_debug = atoi(getenv("REDRAW_DEBUG"));
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:5104:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               redraw_debug = atoi(getenv("REDRAW_DEBUG"));
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:5543:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               redraw_debug = atoi(getenv("REDRAW_DEBUG"));
data/efl-1.25.1/src/modules/ecore_evas/vnc_server/ecore_evas_vnc_server.c:215:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/modules/ecore_evas/vnc_server/ecore_evas_vnc_server.c:342:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[10];
data/efl-1.25.1/src/modules/ecore_evas/vnc_server/ecore_evas_vnc_server.c:682:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(server->frame_buffer + (tmp.x * VNC_BYTES_PER_PIXEL)
data/efl-1.25.1/src/modules/ecore_evas/vnc_server/ecore_evas_vnc_server_fb_keymap.c:11:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *_ecore_fb_li_kbd_syms[144 * 7] =
data/efl-1.25.1/src/modules/ecore_imf/ibus/ibus_imcontext.c:350:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     _sync_mode_use = !!atoi(s);
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:361:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char key_string[128] = { 0 };
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:2241:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf [32];
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:595:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char string[32], key[32], keyname[32];
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:861:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  attr = memcpy(attr, a, sizeof(*attr));
data/efl-1.25.1/src/modules/ecore_imf/xim/ecore_imf_xim.c:577:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char compose_buffer[256];
data/efl-1.25.1/src/modules/eeze/sensor/udev/udev.c:63:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/modules/eeze/sensor/udev/udev.c:75:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(buf, "temp%d_input", x);
data/efl-1.25.1/src/modules/eina/mp/chained_pool/eina_chained_mempool.c:652:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(dst, src, pool->item_alloc);
data/efl-1.25.1/src/modules/eina/mp/chained_pool/eina_chained_mempool.c:701:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)mp->name, context, length);
data/efl-1.25.1/src/modules/eina/mp/one_big/eina_one_big.c:380:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)pool->name, context, length);
data/efl-1.25.1/src/modules/elementary/access_output/mod.c:73:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX];
data/efl-1.25.1/src/modules/elementary/access_output/mod.c:78:17:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
        tmpfd = mkstemp(buf);
data/efl-1.25.1/src/modules/elementary/access_output/mod.c:89:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/modules/elementary/prefs/elm_entry.c:146:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/modules/elementary/prefs/elm_swallow.c:17:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char layout_edj[PATH_MAX];
data/efl-1.25.1/src/modules/elementary/test_map/mod.c:36:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/modules/emotion/gstreamer1/emotion_gstreamer.h:44:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char *plane_ptr[4];
data/efl-1.25.1/src/modules/ethumb/emotion/emotion.c:137:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/modules/ethumb/emotion/emotion.c:274:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/modules/ethumb/emotion/emotion.c:336:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_engine.c:230:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if ((s) && (atoi(s)))
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_engine.c:988:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_engine.c:1043:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_outbuf.c:405:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ob->priv.num = atoi(num);
data/efl-1.25.1/src/modules/evas/engines/eglfs/evas_outbuf.c:411:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
     ob->vsync = atoi(num);
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:343:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char line[256], label[256], value[256];
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:348:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen("/etc/fb.modes","rb");
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:358:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char f1[32], f2[32], f3[32], f4[32];
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:378:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                  modes[num - 1].width = atoi(f1);
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:379:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                  modes[num - 1].height = atoi(f2);
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:381:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                     modes[num - 1].refresh = atoi(f3);
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:768:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dev[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:783:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fb = open(dev, O_RDWR);
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:787:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(dev, "/dev/fb/%i", device);
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:788:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fb = open(dev, O_RDWR);
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:791:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(dev, "/dev/fb%i", device);
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:792:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
             fb = open(dev, O_RDWR);
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:829:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   else if ((tty = open("/dev/tty",O_RDWR)) == -1)
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:1028:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(params, ctx->viewport_coord, sizeof(int)*4);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:1064:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(params, ctx->viewport_coord, sizeof(int)*4);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:1268:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(params, ctx->scissor_coord, sizeof(int)*4);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:1276:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(params, ctx->viewport_coord, sizeof(int)*4);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:1301:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(params, ctx->scissor_coord, sizeof(int)*4);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:1309:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(params, ctx->viewport_coord, sizeof(int)*4);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:1385:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char _version[128] = {0};
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:1386:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char _glsl[128] = {0};
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:2186:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(patched + *patched_len, p, new_len);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_ext.c:460:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(att, attachments, numAttachments * sizeof(GLenum));
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_gles1.c:1051:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(params, ctx->scissor_coord, sizeof(int)*4);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api_gles1.c:1112:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char _version[128] = {0};
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:448:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[32];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:617:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               *minor_version = atoi(&version[12]);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:632:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               *minor_version = atoi(&version[12]);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:662:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   major = atoi(version);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:671:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   minor = atoi(tmp2);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:960:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             if (s) i = atoi(s);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:999:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (s) shared->info.max_vertex_elements = atoi(s);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:1033:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              shared->info.tune.tune_param = atoi(__v); \
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:1050:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             if (atoi(s) == 0) shared->info.bin_program = 0;
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:3225:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char name[32];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:3227:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(name, "filter_data_%d", k);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:4281:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(x + (unsigned long)vertex_ptr, gc->pipe[i].array.vertex, VERTEX_SIZE);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:4283:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(x + (unsigned long)color_ptr, gc->pipe[i].array.color, COLOR_SIZE);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:4285:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(x + (unsigned long)texuv_ptr, gc->pipe[i].array.texuv, TEX_SIZE);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:4287:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(x + (unsigned long)texuv2_ptr, gc->pipe[i].array.texuv2, TEX_SIZE);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:4289:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(x + (unsigned long)texuv3_ptr, gc->pipe[i].array.texuv3, TEX_SIZE);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:4291:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(x + (unsigned long)texa_ptr, gc->pipe[i].array.texa, TEX_SIZE);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:4293:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(x + (unsigned long)texsam_ptr, gc->pipe[i].array.texsam, SAM_SIZE);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:4296:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(x + (unsigned long)mask_ptr, gc->pipe[i].array.mask, MASK_SIZE);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:4298:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                         memcpy(x + (unsigned long)masksam_ptr, gc->pipe[i].array.masksam, SAM_SIZE);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:4697:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[100];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:745:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tag[80];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:751:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   evgl_engine->caps.num_fbo_fmts = atoi(data);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:786:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tag[80], data[80];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:817:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cap_dir_path[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:818:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cap_file_path[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:851:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cap_dir_path[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:852:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cap_file_path[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:853:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp_file_name[PATH_MAX + PATH_MAX + 128];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:1917:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(s) == 1)
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:1927:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(s) == 1)
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:1933:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) direct_off = atoi(s);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:1939:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) direct_soff = atoi(s);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:1945:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (s) debug_mode = atoi(s);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_file_cache.c:48:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ss[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_file_cache.c:89:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char before_name[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_file_cache.c:90:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char after_name[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_font.c:34:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p2,p1,w);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_image.c:439:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(im->cs.data, data, im->im->cache_entry.h * sizeof(unsigned char *) * 2);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_preload.c:331:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (!s || (atoi(s) != 1)) return 0;
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_preload.c:349:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (!s || (atoi(s) != 1)) return 0;
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:53:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *_shader_flags[SHADER_FLAG_COUNT] = {
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:132:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pname[32];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:211:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pname[32];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:290:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char bin_dir_path[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:291:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char bin_file_path[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:323:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char bin_dir_path[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:324:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char bin_file_path[PATH_MAX];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:325:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp_file_name[PATH_MAX + PATH_MAX + 128];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:1016:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char pname[32];
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:1272:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(pd, ps, bytes_count);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:1287:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(pd, ps, bytes_count);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:1438:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&out[0],
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:1445:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&out[i * bytes_count],
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:1451:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&out[((EVAS_GL_TILE_SIZE - 1) * bytes_count)],
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:1458:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&out[j * EVAS_GL_TILE_SIZE * bytes_count],
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:1463:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&out[(j * EVAS_GL_TILE_SIZE + i) * bytes_count],
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:1467:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&out[(j * EVAS_GL_TILE_SIZE + i) * bytes_count],
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:1473:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&out[(j * EVAS_GL_TILE_SIZE) * bytes_count],
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:1480:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&out[((EVAS_GL_TILE_SIZE * j) + i) * bytes_count],
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:1486:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&out[((EVAS_GL_TILE_SIZE * EVAS_GL_TILE_SIZE) - 1) * bytes_count],
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:2093:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tex->double_buffer.pt, pt, sizeof (Evas_GL_Texture_Pool *) * 2);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:2094:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tex->double_buffer.ptuv, ptuv, sizeof (Evas_GL_Texture_Pool *) * 2);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:2290:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(tmp, rows[mb_y] + rmb_x + i, 64);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:2320:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(tmp, rows[mb_y] + rmb_x + i, 64);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:2359:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(tmp, rows[mb_y + base_h] + rmb_x + i, 64);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_texture.c:2390:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(tmp, rows[mb_y + base_h] + rmb_x + i, 64);
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_engine.c:299:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if ((s) && (atoi(s)))
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_engine.c:1385:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_engine.c:1386:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&n->ns_data.wl_surface_dmabuf.attr, a2, sizeof(*a2));
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_engine.c:1436:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_engine.c:1494:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_outbuf.c:594:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[16];
data/efl-1.25.1/src/modules/evas/engines/gl_drm/evas_outbuf.c:601:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[16];
data/efl-1.25.1/src/modules/evas/engines/gl_generic/evas_engine.c:341:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(im->im->image.data + (im->w * i),
data/efl-1.25.1/src/modules/evas/engines/gl_generic/evas_engine.c:578:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(n, ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/gl_generic/evas_engine.c:2881:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(dst, src, w * bpp);
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1441:56:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if ((s = getenv("EVAS_GL_PARTIAL_DISABLE")) && atoi(s))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:2552:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                 memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:2740:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                      memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:2807:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                 memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:2845:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                 memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:2880:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                 memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:2941:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:952:56:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            ((s = getenv("EVAS_GL_DISABLE_GLES3")) && (atoi(s) == 1)))
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:1058:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(&evis->info, &(xvi[j]), sizeof(XVisualInfo));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:1073:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(&evis->info, &(xvi[j]), sizeof(XVisualInfo));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:1116:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(&evis->info, &(xvi[j]), sizeof(XVisualInfo));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:1234:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&evis->info, visinfo, sizeof(XVisualInfo));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:1253:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&evis->info, visinfo, sizeof(XVisualInfo));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:1450:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[16];
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:1457:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[16];
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_x_main.c:1611:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char fname[100];
data/efl-1.25.1/src/modules/evas/engines/software_ddraw/evas_ddraw_buffer.c:74:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(dd_data, evas_data, pitch);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:1068:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(content, &im->cache_entry.content, sizeof (Eina_Rectangle));
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:1615:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(data, im->image.data8 + src_offset, size);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:1652:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(dst, map->slice.bytes, dst_stride * map->rh);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:1658:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(dst + k * dst_stride, map->slice.bytes + k * dst_stride, dst_stride);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:1846:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(dst, src, w * bpp);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:2227:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(pixels_tmp, pixels_in, sizeof (unsigned int) * w * h);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:2261:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(pixels_out, pixels_tmp, sizeof (unsigned int) * w * h);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:2710:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&cm->map->pts[0], &map->pts[0], sizeof(RGBA_Map_Point) * map->count);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:4519:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ne, &ector, sizeof (Evas_Thread_Command_Ector));
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:5547:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(patched + *patched_len, p, new_len);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:5665:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char _version[128] = {0};
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:5666:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char _glsl[128] = {0};
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_native_dmabuf.c:157:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(n, ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_native_dmabuf.c:158:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&n->ns_data.wl_surface_dmabuf.attr, a, sizeof(*a));
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_native_tbm.c:369:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(n, ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_curve.c:43:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(dst, src, dst_len);
data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_mask.c:115:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(dst_map, src_map, dst_stride * h * sizeof(uint8_t));
data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_mask.c:119:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(dst_map + (y * dst_stride), src_map + (y * src_stride),
data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_mask.c:348:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(span, msk, len * sizeof(uint8_t));
data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_mask.c:357:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(span, msk, len * sizeof(uint8_t));
data/efl-1.25.1/src/modules/evas/engines/software_generic/filters/evas_filter_transform.c:67:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(dst, src, src_stride);
data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_engine.c:245:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             if (atoi(s) == 1) try_swapbuf = 0;
data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_dri_image.c:198:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   drm_fd = open(dev_name, O_RDWR);
data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_dri_image.c:597:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_image.c:100:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/software_x11/evas_xlib_swapper.c:556:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   drm_fd = open(dev_name, O_RDWR);
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_engine.c:188:56:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if ((s = getenv("EVAS_GL_PARTIAL_DISABLE")) && atoi(s))
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_engine.c:1190:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_engine.c:1249:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_engine.c:1277:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_engine.c:1307:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&(n->ns), ns, sizeof(Evas_Native_Surface));
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_wl_main.c:416:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[16];
data/efl-1.25.1/src/modules/evas/engines/wayland_egl/evas_wl_main.c:423:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char buf[16];
data/efl-1.25.1/src/modules/evas/image_loaders/bmp/evas_image_load_bmp.c:47:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char b[2];
data/efl-1.25.1/src/modules/evas/image_loaders/bmp/evas_image_load_bmp.c:59:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char b[2];
data/efl-1.25.1/src/modules/evas/image_loaders/bmp/evas_image_load_bmp.c:71:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char b[4];
data/efl-1.25.1/src/modules/evas/image_loaders/bmp/evas_image_load_bmp.c:84:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char b[4];
data/efl-1.25.1/src/modules/evas/image_loaders/bmp/evas_image_load_bmp.c:114:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buffer, map + *position, size);
data/efl-1.25.1/src/modules/evas/image_loaders/dds/evas_image_load_dds.c:379:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, src, srcstride);
data/efl-1.25.1/src/modules/evas/image_loaders/dds/evas_image_load_dds.c:517:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(pix + (((y + k) * prop->w) + x), bgra + (k * 4),
data/efl-1.25.1/src/modules/evas/image_loaders/dds/s3tc_decoder.c:69:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char alpha[8];
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:216:14:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
             strcat(cmd, " -head ");
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:220:14:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
             strcat(cmd, " -key ");
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:227:14:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
             strcat(cmd, " -opt-scale-down-by ");
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:233:14:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
             strcat(cmd, " -opt-dpi ");
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:240:14:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
             strcat(cmd, " -opt-size ");
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:341:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                fd = open(tmpfname, O_RDONLY | O_BINARY, S_IRUSR);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:357:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(body, addr, w * h * sizeof(DATA32));
data/efl-1.25.1/src/modules/evas/image_loaders/gif/evas_image_load_gif.c:395:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf, fi->map + fi->pos, len);
data/efl-1.25.1/src/modules/evas/image_loaders/gif/evas_image_load_gif.c:721:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                         memcpy(thisframe->data, prevframe->data,
data/efl-1.25.1/src/modules/evas/image_loaders/gif/evas_image_load_gif.c:738:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                              memcpy(thisframe->data, prevframe2->data,
data/efl-1.25.1/src/modules/evas/image_loaders/gif/evas_image_load_gif.c:827:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(pixels, frame->data, prop->w * prop->h * sizeof(DATA32));
data/efl-1.25.1/src/modules/evas/image_loaders/ico/evas_image_load_ico.c:28:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char b[2];
data/efl-1.25.1/src/modules/evas/image_loaders/ico/evas_image_load_ico.c:40:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char b[4];
data/efl-1.25.1/src/modules/evas/image_loaders/ico/evas_image_load_ico.c:62:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buffer, map + *position, size);
data/efl-1.25.1/src/modules/evas/image_loaders/jp2k/evas_image_load_jp2k.c:64:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf, map->base + map->idx, offset);
data/efl-1.25.1/src/modules/evas/image_loaders/pmaps/evas_image_load_pmaps.c:25:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char type[3];
data/efl-1.25.1/src/modules/evas/image_loaders/pmaps/evas_image_load_pmaps.c:319:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(b->buffer, b->unread, b->unread_len);
data/efl-1.25.1/src/modules/evas/image_loaders/pmaps/evas_image_load_pmaps.c:325:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&b->buffer[b->unread_len], b->map + b->position, max);
data/efl-1.25.1/src/modules/evas/image_loaders/pmaps/evas_image_load_pmaps.c:365:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(b->buffer, b->unread, b->unread_len);
data/efl-1.25.1/src/modules/evas/image_loaders/pmaps/evas_image_load_pmaps.c:371:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&b->buffer[b->unread_len], b->map + b->position, max);
data/efl-1.25.1/src/modules/evas/image_loaders/pmaps/evas_image_load_pmaps.c:424:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   *val = atoi(start);
data/efl-1.25.1/src/modules/evas/image_loaders/png/evas_image_load_png.c:85:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(out, epi->map + epi->position, count);
data/efl-1.25.1/src/modules/evas/image_loaders/png/evas_image_load_png.c:519:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&prop->content, &optional_content, sizeof (Eina_Rectangle));
data/efl-1.25.1/src/modules/evas/image_loaders/psd/evas_image_load_psd.c:37:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char signature[4];
data/efl-1.25.1/src/modules/evas/image_loaders/psd/evas_image_load_psd.c:39:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char reserved[9];
data/efl-1.25.1/src/modules/evas/image_loaders/psd/evas_image_load_psd.c:85:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(target, map + *position, size);
data/efl-1.25.1/src/modules/evas/image_loaders/tga/evas_image_load_tga.c:50:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                signature[16];
data/efl-1.25.1/src/modules/evas/image_loaders/tga/evas_image_load_tga.c:93:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((unsigned char *)(&tfooter),
data/efl-1.25.1/src/modules/evas/image_loaders/tga/evas_image_load_tga.c:195:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((unsigned char *)&tfooter,
data/efl-1.25.1/src/modules/evas/image_loaders/tiff/evas_image_load_tiff.c:47:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(data, map->mem, size);
data/efl-1.25.1/src/modules/evas/image_loaders/tiff/evas_image_load_tiff.c:110:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           txt[1024];
data/efl-1.25.1/src/modules/evas/image_loaders/tiff/evas_image_load_tiff.c:148:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(txt, "Evas Tiff loader: cannot be processed by libtiff");
data/efl-1.25.1/src/modules/evas/image_loaders/tiff/evas_image_load_tiff.c:154:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(txt, "Evas Tiff loader: cannot begin reading tiff");
data/efl-1.25.1/src/modules/evas/image_loaders/tiff/evas_image_load_tiff.c:194:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                txt[1024];
data/efl-1.25.1/src/modules/evas/image_loaders/tiff/evas_image_load_tiff.c:235:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(txt, "Evas Tiff loader: cannot be processed by libtiff");
data/efl-1.25.1/src/modules/evas/image_loaders/tiff/evas_image_load_tiff.c:241:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(txt, "Evas Tiff loader: cannot begin reading tiff");
data/efl-1.25.1/src/modules/evas/image_loaders/wbmp/evas_image_load_wbmp.c:20:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	buf = ((unsigned char *) map)[(*position)++];
data/efl-1.25.1/src/modules/evas/image_loaders/webp/evas_image_load_webp.c:132:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(frame->data, data, width * height * 4);
data/efl-1.25.1/src/modules/evas/image_loaders/webp/evas_image_load_webp.c:279:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(surface, frame->data, width * height * 4);
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1663:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char          str[6];
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1701:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char         s[256], tok[256], col[256], *tl;
data/efl-1.25.1/src/modules/evas/image_savers/avif/evas_image_save_avif.c:34:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(file, "wb");
data/efl-1.25.1/src/modules/evas/image_savers/jpeg/evas_image_save_jpeg.c:66:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(file, "wb");
data/efl-1.25.1/src/modules/evas/image_savers/png/evas_image_save_png.c:44:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(file, "wb");
data/efl-1.25.1/src/modules/evas/image_savers/png/evas_image_save_png.c:97:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data, im->image.data, im->cache_entry.w * im->cache_entry.h * pixel_size);
data/efl-1.25.1/src/modules/evas/image_savers/png/evas_image_save_png.c:114:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data, im->image.data, im->cache_entry.w * im->cache_entry.h * sizeof(DATA32));
data/efl-1.25.1/src/modules/evas/image_savers/tgv/evas_image_save_tgv.c:106:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(file, "wb");
data/efl-1.25.1/src/modules/evas/image_savers/tgv/evas_image_save_tgv.c:296:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(file, "wb");
data/efl-1.25.1/src/modules/evas/image_savers/tgv/evas_image_save_tgv.c:329:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(data, im->image.data, len * 4);
data/efl-1.25.1/src/modules/evas/image_savers/webp/evas_image_save_webp.c:47:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(picture.argb, im->image.data, picture.width * picture.height * sizeof(DATA32));
data/efl-1.25.1/src/modules/evas/image_savers/webp/evas_image_save_webp.c:59:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(file, "wb");
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:312:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[50];
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:522:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char tmp[3] = { '\0', '\0', '\0' };
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:537:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char tmp[3] = { '\0', '\0', '\0' };
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1297:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&point_array[count], tmp, tmp_count * sizeof(double));
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1308:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&point_array[count], tmp, tmp_count * sizeof(double));
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1565:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_stop, stop, sizeof(Efl_Gfx_Gradient_Stop));
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1595:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(grad->linear, from->linear, sizeof(Svg_Linear_Gradient));
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1600:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(grad->radial, from->radial, sizeof(Svg_Radial_Gradient));
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1616:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(to->style, from->style, sizeof(Svg_Style_Property));
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:2170:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tag_name[20] = "";
data/efl-1.25.1/src/modules/evas/vg_savers/svg/evas_vg_save_svg.c:137:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *f = fopen(file, "w+");
data/efl-1.25.1/src/static_libs/draw/draw_alpha_main.c:27:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst, src, len);
data/efl-1.25.1/src/static_libs/draw/draw_convert.c:318:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(out + x + k * out_step, bgra + (k * 4), 16);
data/efl-1.25.1/src/static_libs/draw/draw_convert.c:350:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(out + x + k * out_step, bgra + (k * 4), 16);
data/efl-1.25.1/src/static_libs/draw/draw_main.c:104:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(dest, src, length * sizeof(uint32_t));
data/efl-1.25.1/src/static_libs/draw/draw_main_sse2.c:213:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(dest, src, length * sizeof(uint32_t));
data/efl-1.25.1/src/static_libs/freetype/sw_ft_stroker.c:768:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( outline->points + outline->n_points,
data/efl-1.25.1/src/static_libs/freetype/sw_ft_stroker.c:1806:43:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                           SW_FT_Bool     open )
data/efl-1.25.1/src/static_libs/freetype/sw_ft_stroker.c:1814:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    stroker->subpath_open = open;
data/efl-1.25.1/src/static_libs/freetype/sw_ft_stroker.c:1837:47:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                               SW_FT_Bool     open )
data/efl-1.25.1/src/static_libs/freetype/sw_ft_stroker.c:1866:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if ( open )
data/efl-1.25.1/src/static_libs/http-parser/contrib/parsertrace.c:111:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(filename, "rb");
data/efl-1.25.1/src/static_libs/http-parser/http_parser.c:145:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char tokens[256] = {
data/efl-1.25.1/src/static_libs/http-parser/test.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char request_path[MAX_ELEMENT_SIZE];
data/efl-1.25.1/src/static_libs/http-parser/test.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char request_url[MAX_ELEMENT_SIZE];
data/efl-1.25.1/src/static_libs/http-parser/test.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fragment[MAX_ELEMENT_SIZE];
data/efl-1.25.1/src/static_libs/http-parser/test.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char query_string[MAX_ELEMENT_SIZE];
data/efl-1.25.1/src/static_libs/http-parser/test.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char body[MAX_ELEMENT_SIZE];
data/efl-1.25.1/src/static_libs/http-parser/test.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char headers [MAX_HEADERS][2][MAX_ELEMENT_SIZE];
data/efl-1.25.1/src/static_libs/http-parser/test.c:1482:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst + dlen, src, ncpy);
data/efl-1.25.1/src/static_libs/http-parser/test.c:1506:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, src, ncpy);
data/efl-1.25.1/src/static_libs/http-parser/test.c:1925:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ubuf[256];                                                    \
data/efl-1.25.1/src/static_libs/http-parser/test.c:1928:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ubuf, (found)->request_url + (u)->field_data[(fn)].off,   \
data/efl-1.25.1/src/static_libs/http-parser/test.c:2905:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[3000];
data/efl-1.25.1/src/static_libs/http-parser/test.c:2936:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char total[ strlen(r1->raw)
data/efl-1.25.1/src/static_libs/http-parser/test.c:2991:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char total[80*1024] = "\0";
data/efl-1.25.1/src/static_libs/http-parser/test.c:2992:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[80*1024] = "\0";
data/efl-1.25.1/src/static_libs/http-parser/test.c:2993:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[80*1024] = "\0";
data/efl-1.25.1/src/static_libs/http-parser/test.c:2994:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf3[80*1024] = "\0";
data/efl-1.25.1/src/static_libs/http-parser/test.c:3116:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, headers, headers_len);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3121:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf + wrote, "400\r\n", 5);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3125:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(buf + wrote, "\r\n");
data/efl-1.25.1/src/static_libs/http-parser/test.c:3129:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf + wrote, "0\r\n\r\n", 6);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3351:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/efl-1.25.1/src/static_libs/http-parser/test.c:3371:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/efl-1.25.1/src/static_libs/libdrm/drm.h:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char padding[60];			/**< Pad to cache line */
data/efl-1.25.1/src/static_libs/libdrm/drm_mode.h:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[DRM_DISPLAY_MODE_LEN];
data/efl-1.25.1/src/static_libs/libdrm/drm_mode.h:320:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[DRM_PROP_NAME_LEN];
data/efl-1.25.1/src/static_libs/libdrm/drm_mode.h:329:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[DRM_PROP_NAME_LEN];
data/efl-1.25.1/src/static_libs/libdrm/xf86drm.h:267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                      padding[60];
data/efl-1.25.1/src/static_libs/libdrm/xf86drm.h:809:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullname[DRM_PLATFORM_DEVICE_NAME_LEN];
data/efl-1.25.1/src/static_libs/libdrm/xf86drm.h:819:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullname[DRM_HOST1X_DEVICE_NAME_LEN];
data/efl-1.25.1/src/static_libs/libdrm/xf86drmMode.h:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[DRM_DISPLAY_MODE_LEN];
data/efl-1.25.1/src/static_libs/libdrm/xf86drmMode.h:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[DRM_PROP_NAME_LEN];
data/efl-1.25.1/src/static_libs/libunibreak/linebreak.c:859:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char brks[2];
data/efl-1.25.1/src/static_libs/lz4/lz4.c:329:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(memPtr, &value, sizeof(value));
data/efl-1.25.1/src/static_libs/lz4/lz4.c:334:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(memPtr, &value, sizeof(value));
data/efl-1.25.1/src/static_libs/lz4/lz4.c:369:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    do { memcpy(d,s,8); d+=8; s+=8; } while (d<e);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:400:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dstPtr+4, srcPtr, 4);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:404:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dstPtr, srcPtr, 8);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:422:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    do { memcpy(d,s,16); memcpy(d+16,s+16,16); d+=32; s+=32; } while (d<e);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:422:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    do { memcpy(d,s,16); memcpy(d+16,s+16,16); d+=32; s+=32; } while (d<e);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:441:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v, srcPtr, 2);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:442:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&v[2], srcPtr, 2);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:443:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&v[4], &v[0], 4);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:446:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v, srcPtr, 4);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:447:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&v[4], srcPtr, 4);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:454:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dstPtr, v, 8);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:457:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dstPtr, v, 8);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1169:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(op, anchor, lastRun);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1545:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(streamPtr, streamPtr->dictCtx, sizeof(LZ4_stream_t));
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1753:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op, ip, 16);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1757:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op, ip, 8);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1758:39:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    if (length > 8) { memcpy(op+8, ip+8, 8); }
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1794:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(op, match, 8);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1795:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(op+8, match+8, 8);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1796:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(op+16, match+16, 2);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1819:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op, dictEnd - copySize, copySize);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1826:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(op, lowPrefix, restSize);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1867:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(op, ip, endOnInput ? 16 : 8);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1882:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op + 0, match + 0, 8);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1883:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op + 8, match + 8, 8);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1884:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op +16, match +16, 2);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:1997:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op, dictEnd - copySize, copySize);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:2004:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(op, lowPrefix, restSize);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:2023:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op, match, mlen);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:2037:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(op+4, match, 4);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:2040:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(op, match, 8);
data/efl-1.25.1/src/static_libs/lz4/lz4.c:2055:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(op, match, 8);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:507:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cdict->dictContent, dictStart, dictSize);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:752:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cSizePtr+BHSize, src, srcSize);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:850:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(cctxPtr->tmpIn + cctxPtr->tmpInSize, srcBuffer, srcSize);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:857:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(cctxPtr->tmpIn + cctxPtr->tmpInSize, srcBuffer, sizeToCopy);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:916:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cctxPtr->tmpIn, srcPtr, sizeToCopy);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1159:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dctx->header, srcPtr, srcSize);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1323:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dctx->tmpOutBuffer + preserveSize - copySize, oldDictEnd - copySize, copySize);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1333:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dctx->tmpOutBuffer, dctx->dict + dctx->dictSize - preserveSize, preserveSize);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1336:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dctx->tmpOutBuffer + dctx->dictSize, dstPtr, dstSize);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1344:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dctx->tmpOutBuffer, dctx->dict + dctx->dictSize - preserveSize, preserveSize);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1345:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dctx->tmpOutBuffer + preserveSize, dstPtr, dstSize);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1415:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->header + dctx->tmpInSize, srcPtr, sizeToCopy);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1470:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->tmpIn + dctx->tmpInSize, srcPtr, sizeToCopy);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1513:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dstPtr, srcPtr, sizeToCopy);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1553:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(dctx->header + dctx->tmpInSize, srcPtr, sizeToCopy);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1590:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->tmpIn + dctx->tmpInSize, srcPtr, sizeToCopy);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1652:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(dctx->tmpOutBuffer, dctx->dict + dctx->dictSize - 64 KB, 64 KB);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1688:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dstPtr, dctx->tmpOut + dctx->tmpOutStart, sizeToCopy);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1729:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->tmpIn + dctx->tmpInSize, srcPtr, sizeToCopy);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1771:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->header + dctx->tmpInSize, srcPtr, sizeToCopy);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1820:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->tmpOutBuffer + preserveSize - copySize, oldDictEnd - copySize, copySize);
data/efl-1.25.1/src/static_libs/lz4/lz4frame.c:1829:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->tmpOutBuffer, oldDictEnd - newDictSize, newDictSize);
data/efl-1.25.1/src/static_libs/lz4/lz4hc.c:732:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(op, anchor, lastRunSize);
data/efl-1.25.1/src/static_libs/lz4/lz4hc.c:854:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx, ctx->dictCtx, sizeof(LZ4HC_CCtx_internal));
data/efl-1.25.1/src/static_libs/lz4/lz4hc.c:1524:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(op, anchor, lastRunSize);
data/efl-1.25.1/src/static_libs/lz4/xxhash.c:112:76:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
static void* XXH_memcpy(void* dest, const void* src, size_t size) { return memcpy(dest,src,size); }
data/efl-1.25.1/src/static_libs/lz4/xxhash.c:434:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dstState, srcState, sizeof(*dstState));
data/efl-1.25.1/src/static_libs/lz4/xxhash.c:446:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(statePtr, &state, sizeof(state) - sizeof(state.reserved));
data/efl-1.25.1/src/static_libs/lz4/xxhash.c:569:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, &hash, sizeof(*dst));
data/efl-1.25.1/src/static_libs/lz4/xxhash.c:895:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dstState, srcState, sizeof(*dstState));
data/efl-1.25.1/src/static_libs/lz4/xxhash.c:907:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(statePtr, &state, sizeof(state) - sizeof(state.reserved));
data/efl-1.25.1/src/static_libs/lz4/xxhash.c:1022:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, &hash, sizeof(*dst));
data/efl-1.25.1/src/static_libs/lz4/xxhash.h:204:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct { unsigned char digest[4]; } XXH32_canonical_t;
data/efl-1.25.1/src/static_libs/lz4/xxhash.h:239:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct { unsigned char digest[8]; } XXH64_canonical_t;
data/efl-1.25.1/src/static_libs/rg_etc/etc2_encoder.c:1029:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(etc2 + 8, etc2_try[bestSolution], 8);
data/efl-1.25.1/src/static_libs/rg_etc/etc2_encoder.c:1066:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(etc2, etc2_try[bestSolution], 8);
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:168:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char rg_etc_quant5_tab[256 + 16];
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:181:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char rg_etc1_to_selector_index[cETC1SelectorValues] = { 2, 3, 1, 0 };
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:182:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char rg_etc_selector_index_to_etc1[cETC1SelectorValues] = { 3, 2, 0, 1 };
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:759:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline unsigned char
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:760:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_byte_bits_get(const unsigned char bytes[8], unsigned char offset, unsigned char num)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:769:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_byte_bits_set(unsigned char bytes[8], unsigned char offset, unsigned char num, unsigned char bits)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:779:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline unsigned char
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:780:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_flip_bit_get(const unsigned char bytes[8])
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:787:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_flip_bit_set(unsigned char bytes[8], unsigned char flip)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:794:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline unsigned char
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:795:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_diff_bit_get(const unsigned char bytes[8])
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:802:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_diff_bit_set(unsigned char bytes[8], unsigned char diff)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:809:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_clear(unsigned char bytes[8])
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:816:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline unsigned char
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:817:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_inten_table_get(const unsigned char bytes[8], unsigned char subblock_id)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:826:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_inten_table_set(unsigned char bytes[8], unsigned char subblock_id, unsigned char t)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:836:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline unsigned char
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:837:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_selector_get(const unsigned char bytes[8], unsigned char x, unsigned char y)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:854:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_selector_set(unsigned char bytes[8], unsigned char x, unsigned char y, unsigned char val)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:879:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc_block_base4_color_get(const unsigned char bytes[8], unsigned char idx)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:901:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_base4_color_set(unsigned char bytes[8], unsigned char idx, unsigned short c)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:919:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_base5_color_get(const unsigned char bytes[8])
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:932:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_base5_color_set(unsigned char bytes[8], unsigned short c)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:941:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_delta3_color_get(const unsigned char bytes[8])
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:954:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
rg_etc1_block_delta3_color_set(unsigned char bytes[8], unsigned short c)
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:1183:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline unsigned char
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:1680:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dst->m_pSelectors, src->m_pSelectors, src->m_n);
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:1900:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(optimizer->m_pResult->m_pSelectors, optimizer->m_best_solution.m_selectors, n);
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:2046:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(trial_solution->m_selectors, optimizer->m_temp_selectors, 8);
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:2057:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(pBest_solution,trial_solution,sizeof(rg_etc1_potential_solution));
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:2175:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(trial_solution->m_selectors, optimizer->m_temp_selectors, n);
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:2188:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(pBest_solution,trial_solution,sizeof(rg_etc1_potential_solution));
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:2358:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&block[4], &selector_val, 2);
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:2360:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&block[6], &selector_val, 2);
data/efl-1.25.1/src/static_libs/rg_etc/rg_etc1.c:2669:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(subblock_pixels, pSrc_pixels + subblock * 8, sizeof(color_quad_u8) * 8);
data/efl-1.25.1/src/static_libs/vg_common/vg_common_json.c:15:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[30];
data/efl-1.25.1/src/static_libs/vg_common/vg_common_svg.c:985:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_stop, stops, sizeof(Efl_Gfx_Gradient_Stop));
data/efl-1.25.1/src/static_libs/vg_common/vg_common_svg.c:1103:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(svg_node->node.command.commands, commands, sizeof (Efl_Gfx_Path_Command) * commands_count);
data/efl-1.25.1/src/static_libs/vg_common/vg_common_svg.c:1104:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(svg_node->node.command.points, points, sizeof (double) * points_count);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:31:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *f = fopen(filePath, "rb+");
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:33:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     f = fopen(filePath, "wb");
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:149:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dir[MAXSIZE] = {'\0'};
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:259:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(src_file, O_RDWR | O_BINARY | O_CREAT, 0700);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:272:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp[PATH_MAX];
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:306:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(src_file, O_RDWR | O_BINARY | O_CREAT, 0400);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:323:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(src_file, O_RDWR | O_BINARY | O_CREAT, 0200);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:339:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(src_file, O_RDWR | O_BINARY | O_CREAT, 0100);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:389:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(src_file, O_RDWR | O_BINARY | O_CREAT, 0700);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:456:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dir_name[MAXSIZE] = {'\0'};
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:457:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char file_name[MAXSIZE] = {'\0'};
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:507:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dest_name[MAXSIZE] = {'\0'};
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_thread_eina_thread_queue.c:27:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                   pad[10];
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_thread_eina_thread_queue.c:373:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                   pad[10];
data/efl-1.25.1/src/tests/ecore/efl_app_test_promise.c:66:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(_ctx.func_ctx, tmp, sizeof (tmp));                          \
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c:133:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fmt[128];
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c:155:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fmt[128];
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con_url.c:113:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(url, "http://");
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con_url.c:121:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(url, "ftp://");
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con_url.c:173:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char url[4096], *username, *password, *file = NULL, *dir = NULL;
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con_url.c:209:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char url[4096];
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:250:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[INET_ADDRSTRLEN + sizeof(":65536")] = "";
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:671:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[INET6_ADDRSTRLEN + sizeof("[]:65536")] = "";
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:699:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&addr->sin6_addr, s, 16);
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:1056:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/tests/edje/edje_suite.c:25:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char filename[PATH_MAX];
data/efl-1.25.1/src/tests/edje/edje_test_container.c:132:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[20];
data/efl-1.25.1/src/tests/edje/edje_test_container.c:135:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buf, "%d,%d", k, l);
data/efl-1.25.1/src/tests/edje/edje_test_container.c:176:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[20];
data/efl-1.25.1/src/tests/edje/edje_test_container.c:179:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buf, "%d,%d", k, l);
data/efl-1.25.1/src/tests/edje/edje_test_container.c:208:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[20];
data/efl-1.25.1/src/tests/edje/edje_test_container.c:211:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buf, "%d,%d", k, l);
data/efl-1.25.1/src/tests/edje/edje_test_edje.c:70:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   wchar_t date[80], time[80];
data/efl-1.25.1/src/tests/edje/edje_test_edje.c:218:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[20];
data/efl-1.25.1/src/tests/edje/edje_test_edje.c:231:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "access_%d", i);
data/efl-1.25.1/src/tests/edje/edje_test_edje.c:245:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "access_%d", i);
data/efl-1.25.1/src/tests/edje/edje_test_signal.c:32:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/tests/edje/edje_test_signal.c:33:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "float %f", 0.12);
data/efl-1.25.1/src/tests/eet/eet_suite.c:11:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char argv0[PATH_MAX];
data/efl-1.25.1/src/tests/eet/eet_suite.c:51:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(argv0, argv[0], strlen(argv[0]) + 1);
data/efl-1.25.1/src/tests/eet/eet_test_cache.c:69:55:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   tmpfd = eina_file_mkstemp("eet_suite_testXXXXXX", &tmpfile);
data/efl-1.25.1/src/tests/eet/eet_test_cache.c:72:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   ef = eet_open(tmpfile, EET_FILE_MODE_WRITE);
data/efl-1.25.1/src/tests/eet/eet_test_cache.c:79:80:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   r = eina_thread_create(&thread, EINA_THREAD_NORMAL, -1, _open_close_worker, tmpfile);
data/efl-1.25.1/src/tests/eet/eet_test_cache.c:98:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   fail_if(unlink(tmpfile) != 0);
data/efl-1.25.1/src/tests/eet/eet_test_cache.c:101:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   eina_tmpstr_del(tmpfile);
data/efl-1.25.1/src/tests/eet/eet_test_cipher.c:26:27:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
   fail_if(-1 == (tmpfd = mkstemp(file)));
data/efl-1.25.1/src/tests/eet/eet_test_common.c:33:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((*string) + length, str, strlen(str) + 1);
data/efl-1.25.1/src/tests/eet/eet_test_common.h:76:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                *charray[10];
data/efl-1.25.1/src/tests/eet/eet_test_common.h:99:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char argv0[PATH_MAX];
data/efl-1.25.1/src/tests/eet/eet_test_file.c:29:27:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
   fail_if(-1 == (tmpfd = mkstemp(file)));
data/efl-1.25.1/src/tests/eet/eet_test_file.c:168:27:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
   fail_if(-1 == (tmpfd = mkstemp(file)));
data/efl-1.25.1/src/tests/eet/eet_test_file.c:321:27:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
   fail_if(-1 == (tmpfd = mkstemp(file)));
data/efl-1.25.1/src/tests/eet/eet_test_file.c:418:27:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
   fail_if(-1 == (tmpfd = mkstemp(file)));
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:19:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _key_pem[PATH_MAX] = "";
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:20:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _cert_pem[PATH_MAX] = "";
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:21:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _key_enc[PATH_MAX] = "";
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:22:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _key_enc_pem[PATH_MAX] = "";
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:23:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _key_enc_none_pem[PATH_MAX] = "";
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:69:24:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
   fail_if(-1 == (fd = mkstemp(file)));
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:71:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fail_if(!(noread = fopen("/dev/null", "wb")));
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:112:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(file, O_WRONLY | O_BINARY);
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:192:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char base[PATH_MAX] = "";
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:193:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[PATH_MAX];
data/efl-1.25.1/src/tests/eet/eet_test_image.c:88:27:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
   fail_if(-1 == (tmpfd = mkstemp(file)));
data/efl-1.25.1/src/tests/eet/eet_test_image.c:454:27:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
   fail_if(-1 == (tmpfd = mkstemp(file)));
data/efl-1.25.1/src/tests/efl/efl_test_container_model.c:33:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * const base_str[7] = {"A", "B", "C", "D", "E", "", "GH"};
data/efl-1.25.1/src/tests/efl_check.h:261:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char srunner_xml_buf[4096];
data/efl-1.25.1/src/tests/efl_mono/dummy_test_object.c:324:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(out, mem, size);
data/efl-1.25.1/src/tests/efreet/ef_data_dirs.c:179:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dirs[128], *val;
data/efl-1.25.1/src/tests/efreet/ef_data_dirs.c:266:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dirs[128], *val;
data/efl-1.25.1/src/tests/efreet/ef_desktop.c:211:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char olddir[PATH_MAX];
data/efl-1.25.1/src/tests/efreet/ef_icon_theme.c:85:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/efreet/ef_icon_theme.c:157:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char p[PATH_MAX];
data/efl-1.25.1/src/tests/efreet/ef_icon_theme.c:538:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[PATH_MAX];
data/efl-1.25.1/src/tests/efreet/efreet_spec_test.c:56:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char new_path[PATH_MAX];
data/efl-1.25.1/src/tests/efreet/main.c:87:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[PATH_MAX];
data/efl-1.25.1/src/tests/eina/eina_test_array.c:49:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   fail_if(atoi(eina_array_data_get(ea, 10)) != 10);
data/efl-1.25.1/src/tests/eina/eina_test_array.c:52:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   fail_if(atoi(tmp) != 200);
data/efl-1.25.1/src/tests/eina/eina_test_array.c:57:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fail_if((unsigned int)atoi(tmp) != i);
data/efl-1.25.1/src/tests/eina/eina_test_array.c:89:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   fail_if(atoi(eina_array_data_get(&sea, 10)) != 10);
data/efl-1.25.1/src/tests/eina/eina_test_array.c:93:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fail_if((unsigned int)atoi(tmp) != i);
data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c:125:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(alloc_buf, cbuf, size);
data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c:223:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char pattern[1024 * 16];
data/efl-1.25.1/src/tests/eina/eina_test_binshare.c:63:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4];
data/efl-1.25.1/src/tests/eina/eina_test_binshare.c:120:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char build[64] = "string_";
data/efl-1.25.1/src/tests/eina/eina_test_binshare.c:138:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[50];
data/efl-1.25.1/src/tests/eina/eina_test_convert.c:36:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[128];
data/efl-1.25.1/src/tests/eina/eina_test_convert.c:37:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ref[128];
data/efl-1.25.1/src/tests/eina/eina_test_convert.c:78:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[128];
data/efl-1.25.1/src/tests/eina/eina_test_convert.c:111:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp1[128];
data/efl-1.25.1/src/tests/eina/eina_test_convert.c:112:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp2[128];
data/efl-1.25.1/src/tests/eina/eina_test_error.c:153:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/tests/eina/eina_test_file.c:158:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char full_path[PATH_MAX] = "";
data/efl-1.25.1/src/tests/eina/eina_test_file.c:346:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((big_buffer + start_point_final), template, size);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:359:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(test_file_path, O_WRONLY | O_BINARY | O_CREAT | O_TRUNC, S_IWUSR | S_IRUSR);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:364:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(test_file2_path, O_WRONLY | O_BINARY | O_CREAT | O_TRUNC, S_IWUSR | S_IRUSR);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:493:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char filename[MAX_PATH];
data/efl-1.25.1/src/tests/eina/eina_test_file.c:599:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(test_file_path, O_RDONLY | O_BINARY | O_CREAT | O_TRUNC, S_IRWXU | S_IRWXG | S_IRWXO);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:726:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(test_file1_path, O_WRONLY | O_BINARY | O_CREAT | O_TRUNC, S_IWUSR | S_IRUSR);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:731:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(test_file2_path, O_WRONLY | O_BINARY | O_CREAT | O_TRUNC, S_IWUSR | S_IRUSR);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:758:17:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   Eina_Tmpstr *tmpfile, *tmpdir = NULL;
data/efl-1.25.1/src/tests/eina/eina_test_file.c:759:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/eina/eina_test_file.c:761:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fmt[256];
data/efl-1.25.1/src/tests/eina/eina_test_file.c:790:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(fmt, "/proc/self/fd/%d", fd);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:795:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[4096];
data/efl-1.25.1/src/tests/eina/eina_test_file.c:812:46:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        fd = eina_file_mkstemp(patterns[k], &tmpfile);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:814:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        ck_assert(!!tmpfile);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:815:31:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        file = eina_file_open(tmpfile, EINA_FALSE);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:818:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        unlink(tmpfile);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:819:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        eina_tmpstr_del(tmpfile);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:838:33:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   fd = eina_file_mkstemp(buf, &tmpfile);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:839:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   fail_if((fd < 0) || !tmpfile);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:847:33:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
     fail_if(strcmp(info->path, tmpfile));
data/efl-1.25.1/src/tests/eina/eina_test_file.c:851:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   fail_if(unlink(tmpfile));
data/efl-1.25.1/src/tests/eina/eina_test_file.c:882:31:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   fd = create_file_not_empty(tmpfile, &test_file_path, EINA_TRUE);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:887:31:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   fd = create_file_not_empty(tmpfile, &test_file_path, EINA_TRUE);
data/efl-1.25.1/src/tests/eina/eina_test_hash.c:66:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   i = atoi(key);
data/efl-1.25.1/src/tests/eina/eina_test_hash.c:371:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char convert[128];
data/efl-1.25.1/src/tests/eina/eina_test_iterator.c:188:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[10];
data/efl-1.25.1/src/tests/eina/eina_test_iterator.c:200:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   fail_if(atoi((char *)tuple->key) != *((int *)tuple->data));
data/efl-1.25.1/src/tests/eina/eina_test_log.c:439:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[4];
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char full_path[PATH_MAX] = "";
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:56:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(get_file_full_path("sample.gpx"), "rb");
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:222:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(get_file_full_path("sample.gpx"), "rb");
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:32:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024] = "";
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:237:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char a[128], b[128];
data/efl-1.25.1/src/tests/eina/eina_test_slstr.c:137:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char local[64];
data/efl-1.25.1/src/tests/eina/eina_test_slstr.c:140:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(local, "Hello world %d", k);
data/efl-1.25.1/src/tests/eina/eina_test_str.c:94:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(str, "bSd");
data/efl-1.25.1/src/tests/eina/eina_test_str.c:102:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(str, " a\\x'");
data/efl-1.25.1/src/tests/eina/eina_test_str.c:111:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(str, "a\t ");
data/efl-1.25.1/src/tests/eina/eina_test_str.c:183:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
     strcat(str, "ma:");
data/efl-1.25.1/src/tests/eina/eina_test_str.c:184:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(str, "ma");
data/efl-1.25.1/src/tests/eina/eina_test_str.c:253:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dst[9];
data/efl-1.25.1/src/tests/eina/eina_test_str.c:293:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dst[9];
data/efl-1.25.1/src/tests/eina/eina_test_str.c:326:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buf[7];
data/efl-1.25.1/src/tests/eina/eina_test_str.c:340:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf, "aaabbb", 6);
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:327:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pattern[1024 * 16];
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:635:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cbuf[32];
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:100:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4];
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:161:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char build[64] = "string_";
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:173:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[50];
data/efl-1.25.1/src/tests/eina/eina_test_tmpstr.c:33:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[max_str_len + 1];
data/efl-1.25.1/src/tests/eina/eina_test_tmpstr.c:67:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[max_str_len + 1];
data/efl-1.25.1/src/tests/eina/eina_test_tmpstr.c:100:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(buf, "tmpstr");
data/efl-1.25.1/src/tests/eina/eina_test_tmpstr.c:112:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(buf, "tmpstr");
data/efl-1.25.1/src/tests/eina/eina_test_value.c:666:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/tests/eina/eina_test_value.c:859:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/tests/eina/eina_test_value.c:2057:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/tests/eina/eina_test_value.c:2166:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/tests/eina/eina_test_value.c:2208:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/tests/eina/eina_test_value.c:2316:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/tests/eina/eina_test_value.c:2437:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/efl-1.25.1/src/tests/eina/eina_test_value.c:2813:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/tests/eina/eina_test_vpath.c:14:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char test[PATH_MAX];
data/efl-1.25.1/src/tests/eina/eina_test_vpath.c:77:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/eina/eina_test_vpath.c:78:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cmp[PATH_MAX];
data/efl-1.25.1/src/tests/eina/eina_test_vpath.c:93:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/eina/eina_test_vpath.c:94:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cmp[PATH_MAX];
data/efl-1.25.1/src/tests/eina/eina_test_xattr.c:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file_path[PATH_MAX] = "";
data/efl-1.25.1/src/tests/eina/eina_test_xattr.c:55:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(test_file_path, O_WRONLY | O_CREAT | O_TRUNC, S_IRWXU | S_IRWXG | S_IRWXO);
data/efl-1.25.1/src/tests/eina/eina_test_xattr.c:126:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(test_file_path, O_WRONLY | O_CREAT | O_TRUNC, S_IRWXU | S_IRWXG | S_IRWXO);
data/efl-1.25.1/src/tests/eina/eina_test_xattr.c:128:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd1 = open(cp_file_path, O_WRONLY | O_CREAT | O_TRUNC, S_IRWXU | S_IRWXG | S_IRWXO);
data/efl-1.25.1/src/tests/eina/eina_test_xattr.c:261:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(test_file_path, O_WRONLY | O_CREAT | O_TRUNC, S_IRWXU | S_IRWXG | S_IRWXO);
data/efl-1.25.1/src/tests/eio/eio_test_common.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char full_path[PATH_MAX] = "";
data/efl-1.25.1/src/tests/eio/eio_test_common.c:78:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(filename, O_RDWR | O_BINARY | O_CREAT, default_rights);
data/efl-1.25.1/src/tests/eio/eio_test_common.c:87:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(filename, O_RDWR | O_BINARY | O_CREAT, default_rights);
data/efl-1.25.1/src/tests/eio/eio_test_manager_xattr.c:135:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(test_file_path,
data/efl-1.25.1/src/tests/eio/eio_test_monitor.c:80:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *fd = fopen((const char*)data, "wb+");
data/efl-1.25.1/src/tests/eio/eio_test_monitor.c:98:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *fd = fopen((const char*)data, "ab");
data/efl-1.25.1/src/tests/eio/eio_test_sentry.c:77:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *fd = fopen((const char*)data, "wb+");
data/efl-1.25.1/src/tests/eio/eio_test_sentry.c:93:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *fd = fopen((const char*)data, "ab");
data/efl-1.25.1/src/tests/eio/eio_test_xattr.c:142:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(test_file_path,
data/efl-1.25.1/src/tests/eio/eio_test_xattr.c:193:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(test_file_path,
data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_message.c:35:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *container_data[CONTAINER_COUNT] = {"first", "second"};
data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_model_method.c:29:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/tests/eldbus/eldbus_test_eldbus_model_signal.c:27:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/tests/eldbus/eldbus_test_fake_server_eldbus_model_proxy.c:33:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[1024];
data/efl-1.25.1/src/tests/elementary/efl_ui_suite.h:13:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[len+1], actual[len+1];        \
data/efl-1.25.1/src/tests/elementary/efl_ui_test_box.c:32:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                     testname[1024];
data/efl-1.25.1/src/tests/elementary/efl_ui_test_box_flow.c:30:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                     testname[1024];
data/efl-1.25.1/src/tests/elementary/efl_ui_test_box_stack.c:30:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                     testname[1024];
data/efl-1.25.1/src/tests/elementary/efl_ui_test_collection_common.c:16:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char buf[PATH_MAX];
data/efl-1.25.1/src/tests/elementary/efl_ui_test_layout.c:23:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/elementary/efl_ui_test_layout.c:68:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/elementary/efl_ui_test_popup.c:22:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/elementary/efl_ui_test_popup.c:214:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/elementary/efl_ui_test_popup.c:758:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/elementary/efl_ui_test_relative_container.c:31:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                     testname[1024];
data/efl-1.25.1/src/tests/elementary/efl_ui_test_spotlight.c:474:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&start, e, sizeof(Efl_Ui_Spotlight_Transition_Event));
data/efl-1.25.1/src/tests/elementary/efl_ui_test_spotlight.c:482:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&end, e, sizeof(Efl_Ui_Spotlight_Transition_Event));
data/efl-1.25.1/src/tests/elementary/efl_ui_test_table.c:31:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char                     testname[1024];
data/efl-1.25.1/src/tests/elementary/elm_code_file_test_load.c:17:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char real[EINA_PATH_MAX];
data/efl-1.25.1/src/tests/elementary/elm_code_test_basic.c:32:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char realpath1[PATH_MAX], realpath2[PATH_MAX];
data/efl-1.25.1/src/tests/elementary/elm_suite.h:8:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[len+1], actual[len+1];        \
data/efl-1.25.1/src/tests/elementary/elm_test_entry.c:407:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096];
data/efl-1.25.1/src/tests/elementary/elm_test_fileselector.c:103:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   Eina_Bool open, selected;
data/efl-1.25.1/src/tests/elementary/elm_test_fileselector.c:117:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen(exist, "w");
data/efl-1.25.1/src/tests/elementary/elm_test_fileselector.c:123:79:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   evas_object_smart_callback_add(fileselector, "directory,open", _ready_cb, &open);
data/efl-1.25.1/src/tests/elementary/elm_test_fileselector.c:129:54:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   ck_assert(fileselector_test_helper_wait_flag(10, &open));
data/efl-1.25.1/src/tests/elementary/elm_test_genlist.c:140:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[128];
data/efl-1.25.1/src/tests/elementary/elm_test_image.c:27:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(filename, "rb");
data/efl-1.25.1/src/tests/elementary/elm_test_image.c:88:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[PATH_MAX];
data/efl-1.25.1/src/tests/elementary/elm_test_image.c:100:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[PATH_MAX];
data/efl-1.25.1/src/tests/elementary/elm_test_image.c:196:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char path[PATH_MAX];
data/efl-1.25.1/src/tests/elementary/elm_test_layout.c:46:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/elementary/elm_test_naviframe.c:147:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[12];
data/efl-1.25.1/src/tests/elementary/elm_test_progressbar.c:32:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char format[50];
data/efl-1.25.1/src/tests/elua/elua_lib.c:25:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *cargv[2];
data/efl-1.25.1/src/tests/elua/elua_lib.c:87:10:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
    fd = mkstemp(buf);
data/efl-1.25.1/src/tests/elua/elua_lib.c:104:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(buf, "wb");
data/efl-1.25.1/src/tests/elua/elua_lib.c:112:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(buf, "wb");
data/efl-1.25.1/src/tests/emile/emile_test_base64.c:44:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        eina_binbuf_append_length(buffer, (const unsigned char *) base64_tests[i].decoded_str, base64_tests[i].len);
data/efl-1.25.1/src/tests/emile/emile_test_base64.c:93:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        eina_binbuf_append_length(buffer, (const unsigned char *) base64_tests[i].decoded_str, base64_tests[i].len);
data/efl-1.25.1/src/tests/emotion/emotion_test_main-eo.c:302:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/tests/emotion/emotion_test_main-eo.c:474:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/tests/emotion/emotion_test_main-eo.c:488:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/tests/emotion/emotion_test_main.c:305:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/tests/emotion/emotion_test_main.c:478:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/tests/emotion/emotion_test_main.c:492:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[256];
data/efl-1.25.1/src/tests/eo/suite/eo_test_general.c:957:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char _buf[sizeof(long)]; /* Just enough to hold eina magic + a bit more. */
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:21:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ifnbuf[PATH_MAX];
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:24:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   tmp_file = fopen(ifnbuf, "rb");
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:30:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   ref_file = fopen(ref_filename, "rb");
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:74:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ifnbuf[PATH_MAX];
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:86:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char command[PATH_MAX];
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:99:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char output_filepath[PATH_MAX + 128] = "";
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:116:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char output_filepath[PATH_MAX + 128] = "";
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:135:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char output_filepath[PATH_MAX + 128] = "";
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:146:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char output_filepath[PATH_MAX + 128] = "";
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:157:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char output_filepath[PATH_MAX + 128] = "";
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:168:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char output_filepath[PATH_MAX + 128] = "";
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:179:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char output_filepath[PATH_MAX + 128] = "";
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:192:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char output_filepath[PATH_MAX + 128] = "";
data/efl-1.25.1/src/tests/eolian/eolian_generation.c:221:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char output_filepath[PATH_MAX + 128] = "";
data/efl-1.25.1/src/tests/eolian/eolian_parsing.c:1477:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char pattern[24];
data/efl-1.25.1/src/tests/eolian/eolian_parsing.c:1479:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pattern, "part%d", i + 1);
data/efl-1.25.1/src/tests/eolian/eolian_parsing.c:1482:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pattern, "Part %d", i + 1);
data/efl-1.25.1/src/tests/eolian_cxx/name1_name2_type_generation.c:112:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, foobar, sizeof(foobar));
data/efl-1.25.1/src/tests/eolian_cxx/name1_name2_type_generation.c:121:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, foobar, sizeof(foobar));
data/efl-1.25.1/src/tests/evas/evas_buffer_helper.c:166:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(dest, "wb+");
data/efl-1.25.1/src/tests/evas/evas_test_filters.c:194:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/efl-1.25.1/src/tests/evas/evas_test_image.c:319:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(d, r_d, w * h * 4);
data/efl-1.25.1/src/tests/evas/evas_test_image.c:637:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   f = fopen(filename, "rb");
data/efl-1.25.1/src/tests/evas/evas_test_mask.c:151:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(refdata[0], ecore_evas_buffer_pixels_get(ee), W * H * 4);
data/efl-1.25.1/src/tests/evas/evas_test_mask.c:157:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(refdata[1], ecore_evas_buffer_pixels_get(ee), W * H * 4);
data/efl-1.25.1/src/tests/evas/evas_test_mask.c:189:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(data, ecore_evas_buffer_pixels_get(ee), W * H * 4);
data/efl-1.25.1/src/tests/evas/evas_test_mask.c:195:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(data, ecore_evas_buffer_pixels_get(ee), W * H * 4);
data/efl-1.25.1/src/tests/evas/evas_test_mask.c:207:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(data, ecore_evas_buffer_pixels_get(ee), W * H * 4);
data/efl-1.25.1/src/tests/evas/evas_test_mask.c:212:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(data, ecore_evas_buffer_pixels_get(ee), W * H * 4);
data/efl-1.25.1/src/tests/evas/evas_test_mask.c:234:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(refdata[2], ecore_evas_buffer_pixels_get(ee), W * H * 4);
data/efl-1.25.1/src/tests/evas/evas_test_mask.c:241:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(data, ecore_evas_buffer_pixels_get(ee), W * H * 4);
data/efl-1.25.1/src/tests/evas/evas_test_mask.c:349:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(data, ecore_evas_buffer_pixels_get(ee), W * H * 4);
data/efl-1.25.1/src/tests/evas/evas_test_mask.c:364:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(refdata, ecore_evas_buffer_pixels_get(ee), W * H * 4);
data/efl-1.25.1/src/tests/evas/evas_test_textblock.c:2212:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           char buf[128];
data/efl-1.25.1/src/tests/evas/evas_test_textblock.c:2215:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
           sprintf(buf, "+ ellipsis=%f", ellip);
data/efl-1.25.1/src/tests/evas/evas_test_textblock.c:2236:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
           sprintf(buf, "+ ellipsis=%f", ellip);
data/efl-1.25.1/src/tests/evas/evas_test_textblock.c:2461:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char str[(CNT * 6) + 128], *d;
data/efl-1.25.1/src/tests/evas/evas_test_textblock.c:2470:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(d, substr, l);
data/efl-1.25.1/src/tests/evil/evil_test_stdio.c:36:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(n, "wb");
data/efl-1.25.1/src/tests/evil/evil_test_stdio.c:56:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(n, "wb");
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:199:9:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
   fd = mkstemp(template);
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:213:9:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
   fd = mkstemp(template);
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:254:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:265:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:276:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/tests/evil/evil_test_stdlib.c:287:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[PATH_MAX];
data/efl-1.25.1/src/benchmarks/eina/evas_hash.c:121:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!(el = malloc(sizeof(struct _Evas_Hash_El) + strlen(key) + 1)))
data/efl-1.25.1/src/bin/ecore_con/efl_net_proxy_helper.c:239:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             int len = strlen(inbuf);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:1235:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strncmp(last, "params.", strlen("params.")))
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:1236:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     name = strdup(last + strlen("params."));
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:1881:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        et = mem_alloc(SZ(Edje_Program_Target) + strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:1885:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memcpy(copy, name, strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:1920:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pa = mem_alloc(SZ(Edje_Program_After) + strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:1923:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memcpy(copy, name, strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:2346:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   entry_len = strlen(vector->entry);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:10936:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             str = realloc(str, strlen(str) + strlen(s) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:10936:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             str = realloc(str, strlen(str) + strlen(s) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13204:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sp = strlen(part);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13209:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (name) sn = strlen(name);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13228:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             sn = strlen(name);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13238:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str, name, sn);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13239:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
        strncat(str, ":", sn);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13240:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(str, part, sn);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13684:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   pa = mem_alloc(SZ(Edje_Program_After) + strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13688:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memcpy(copy, name, strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13761:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   def_name = alloca(strlen("program_") + strlen("FFFFFFFFFFFFFFFF") + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:13761:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   def_name = alloca(strlen("program_") + strlen("FFFFFFFFFFFFFFFF") + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:14449:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   et = mem_alloc(SZ(Edje_Program_Target) + strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:14452:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memcpy(copy, name, strlen(name) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_handlers.c:14750:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(cp->script);
data/efl-1.25.1/src/bin/edje/edje_cc_mem.c:31:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       file_in, line, strlen(s) + 1, strerror(errno), s);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1578:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  int size = strlen(img->entry) + strlen(".png") + 1;
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:1578:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  int size = strlen(img->entry) + strlen(".png") + 1;
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2208:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(sc->cd->original) + 1, compress_mode);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2216:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(cp->original) + 1, compress_mode);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2532:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   dat.size = strlen(dat.buf);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:2640:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *s = alloca(strlen(lw->file) + 1 + 13);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:3800:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  tmp = alloca(strlen(alias) + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:4112:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   keyl = strlen(prefix) + 2;
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:4323:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(cl->ptr, buf, n);
data/efl-1.25.1/src/bin/edje/edje_cc_out.c:4515:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(str);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:205:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(buf, stack_id(), sizeof(buf) - 1);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:211:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
   strcpy(end, "*");
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:514:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(tok, tok_start, tok_end - tok_start + 1);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:529:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memmove(p, p + 1, strlen(p));
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:533:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memmove(p, p + 1, strlen(p));
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:538:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memmove(p, p + 1, strlen(p));
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:543:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memmove(p, p + 1, strlen(p));
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:578:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             token_length = strlen(token);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:623:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   tmp_length = strlen(tmp);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:709:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      eina_strbuf_length_get(stack_buf) - strlen(tmp) - 1,
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:739:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           eina_strbuf_length_get(buf) - strlen(tmp),
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:952:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                            strncpy(v, verbatim_1, l);
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1059:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               len += strlen(define) + 1;
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1065:19:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                  strcat(def, " ");
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1172:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (data && (read(fd, data, size) == size))
data/efl-1.25.1/src/bin/edje/edje_cc_parse.c:1975:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((size - 1) < strlen(in))
data/efl-1.25.1/src/bin/edje/edje_cc_script.c:69:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char *end = begin + strlen(begin);
data/efl-1.25.1/src/bin/edje/edje_cc_script.c:194:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                  strncpy(sym->body, body, (begin - body - 2));
data/efl-1.25.1/src/bin/edje/edje_cc_sources.c:156:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      if (dir) dir_len = strlen(dir);
data/efl-1.25.1/src/bin/edje/edje_codegen.c:428:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:437:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, source_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:451:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:468:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:472:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, source_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:489:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (fwrite(buf, strlen(buf), 1, source_fd) != 1)      \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:494:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (fwrite(buf, strlen(buf), 1, header_fd) != 1)      \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:513:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, source_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:516:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:534:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (fwrite(buf, strlen(buf), 1, source_fd) != 1)                       \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:539:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (fwrite(buf, strlen(buf), 1, header_fd) != 1)                       \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:545:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (fwrite(buf, strlen(buf), 1, source_fd) != 1)                       \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:550:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (fwrite(buf, strlen(buf), 1, header_fd) != 1)                       \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:623:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:673:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (fwrite(buf, strlen(buf), 1, source_fd) != 1)      \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:677:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (fwrite(buf, strlen(buf), 1, header_fd) != 1)      \
data/efl-1.25.1/src/bin/edje/edje_codegen.c:684:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:869:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, source_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:875:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:881:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:899:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, source_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:904:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, source_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:910:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:916:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_codegen.c:921:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/edje/edje_convert.c:252:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buffer = alloca(strlen(ce->entry) + strlen(#Tp) + 2); \
data/efl-1.25.1/src/bin/edje/edje_convert.c:252:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buffer = alloca(strlen(ce->entry) + strlen(#Tp) + 2); \
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:167:29:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        if (buf[0] != '\0') strcat(buf, "|");
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:173:29:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        if (buf[0] != '\0') strcat(buf, "|");
data/efl-1.25.1/src/bin/edje/edje_external_inspector.c:179:29:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        if (buf[0] != '\0') strcat(buf, "|");
data/efl-1.25.1/src/bin/edje/edje_multisense_convert.c:107:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   tmp = malloc(strlen(snd_path) + 1 + 5);
data/efl-1.25.1/src/bin/edje/edje_multisense_convert.c:218:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   tmp = malloc(strlen(snd_path) + 1 + 4);
data/efl-1.25.1/src/bin/edje/edje_player.c:452:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(part, args, p - args);
data/efl-1.25.1/src/bin/edje/edje_player.c:548:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(buf);
data/efl-1.25.1/src/bin/edje/edje_player.c:573:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             char *q = p + strlen(p) - 1;
data/efl-1.25.1/src/bin/edje/edje_player.c:814:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(buf, part_name, sizeof(buf) - 1);
data/efl-1.25.1/src/bin/edje/edje_player.c:818:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
        strncat(buf, " -> ", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/bin/edje/edje_player.c:818:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(buf, " -> ", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/bin/edje/edje_player.c:820:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(buf, part_name, sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/bin/edje/edje_player.c:820:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(buf, part_name, sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:631:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = (unsigned char *)alloca(2 * strlen((char *)str) + 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:632:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy((char *)buf, (const char *)str, p - str);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:648:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   do_define(pfile, NULL, buf, buf + strlen((char *)buf));
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:660:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   buf = (unsigned char *)alloca(strlen((char *)str) + 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:685:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cpp_push_buffer(pfile, buf, strlen((char *)buf));
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:714:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int                 len = strlen(dir->fname) + INCLUDE_LEN_FUDGE;
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:734:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int                 size = strlen(string);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:1556:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(name, (const char *)temp->name, temp->length);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2139:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   CPP_RESERVE(pfile, 4 * strlen(ip->nominal_fname) + 50);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2147:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   CPP_ADJUST_WRITTEN(pfile, strlen((char *)CPP_PWRITTEN(pfile)));
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2339:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   CPP_RESERVE(pfile, 3 + 4 * strlen(string));
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2356:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bufx = (char *)alloca(3 + strlen(version_string));
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2453:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(buf);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2500:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pass_thru_directive(directive, &directive[strlen(directive)], pfile,
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2505:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pass_thru_directive(directive, &directive[strlen(directive)], pfile,
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2511:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pass_thru_directive(directive, &directive[strlen(directive)], pfile,
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2518:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pass_thru_directive(directive, &directive[strlen(directive)], pfile,
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2524:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pass_thru_directive(directive, &directive[strlen(directive)], pfile,
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2531:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pass_thru_directive(directive, &directive[strlen(directive)], pfile,
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2537:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pass_thru_directive(directive, &directive[strlen(directive)], pfile,
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:2542:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pass_thru_directive(directive, &directive[strlen(directive)],
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3256:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			    strncpy(dsp[0].fname, nam, n);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3330:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(fname, (const char *)fbeg, flen);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3363:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		  strcat(fname, "/");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3364:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  fname[strlen(fname) + flen] = 0;
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3370:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	     strncat(fname, (const char *)fbeg, flen);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3382:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		  strncpy(fname, fbeg, flen);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3421:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(fname, (const char *)fbeg, flen);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3445:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    p = (char *)alloca(strlen(searchptr->fname)
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3446:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					       + strlen(fname) + 2);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3448:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			    strcat(p, "/");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:3592:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   unsigned            length = strlen(sys_dir);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:4023:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fname_len = (p) ? (int)(p - fname) : (int)strlen(fname);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5330:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   i->name = (char *)xmalloc(strlen(fname) + 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5370:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((ch = getc(f)) != EOF && !is_space[ch])
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5413:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   name = (char *)alloca(strlen(dirname) + strlen(FILE_NAME_MAP_FILE) + 2);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5413:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   name = (char *)alloca(strlen(dirname) + strlen(FILE_NAME_MAP_FILE) + 2);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5416:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(name, "/");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5428:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int                 dirlen = strlen(dirname);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5430:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((ch = getc(f)) != EOF)
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5438:20:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	     while ((ch = getc(f)) != EOF && is_hor_space[ch]);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5451:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  ptr->map_to = (char *)xmalloc(dirlen + strlen(to) + 2);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5461:20:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	     while ((ch = getc(f)) != '\n')
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5499:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   from += strlen(searchptr->fname) + 1;
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5518:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       && strlen(searchptr->fname) == (unsigned)(p - filename)
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5744:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	p = (char *)alloca(strlen(predefs) + 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5837:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   (unsigned char *)pend->arg + strlen(pend->arg));
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5874:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   char               *nstore = (char *)alloca(strlen(epath) + 2);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5896:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		     strncpy(nstore, startp, endp - startp);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5898:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(nstore, ".");
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5933:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strcmp(default_prefix + strlen(default_prefix) - 8, "/include"))
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5935:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     default_len = strlen(default_prefix) - 7;
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5956:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     strlen(specd_prefix) + strlen(di->fname) -
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:5956:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     strlen(specd_prefix) + strlen(di->fname) -
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6128:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     p = (char *)alloca(strlen(q) + 8);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6132:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     len = strlen(p);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6305:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		       dirtmp->fname = (char *)xmalloc(strlen(argv[i + 1]) + 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6331:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(prefix + strlen(prefix) - 8, "/include"))
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6332:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       prefix[strlen(prefix) - 7] = 0;
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6345:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		       dirtmp->fname = (char *)xmalloc(strlen(argv[i + 1])
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6346:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						       + strlen(prefix) + 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6374:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(prefix + strlen(prefix) - 8, "/include"))
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6375:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       prefix[strlen(prefix) - 7] = 0;
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6388:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		       dirtmp->fname = (char *)xmalloc(strlen(argv[i + 1])
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:6389:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						       + strlen(prefix) + 1);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:7180:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int                 nchars = read(desc, ptr, left);
data/efl-1.25.1/src/bin/edje/epp/cpplib.c:7201:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   unsigned            size = strlen(input);
data/efl-1.25.1/src/bin/edje/epp/cppmain.c:50:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   p = argv[0] + strlen(argv[0]);
data/efl-1.25.1/src/bin/eeze/eeze_udev_test/eeze_udev_test.c:38:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (!strncmp(device + 5, name, strlen(device + 5) - 8)) goto end;
data/efl-1.25.1/src/bin/eeze/eeze_udev_test/eeze_udev_test.c:40:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (!strncmp(device + 5, name, strlen(device + 5) - 8)) goto end;
data/efl-1.25.1/src/bin/efl/efl_debug.c:173:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf) + 1;
data/efl-1.25.1/src/bin/efl/efl_debugd.c:285:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size = 2 * sizeof(int) + (c->app_name ? strlen(c->app_name) : 0) + 1; /* cid + pid + name + \0 */
data/efl-1.25.1/src/bin/efl/efl_debugd.c:292:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        STORE(tmp, c->app_name, strlen(c->app_name) + 1);
data/efl-1.25.1/src/bin/efl/efl_debugd.c:340:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size = 2 * sizeof(int) + (c->app_name ? strlen(c->app_name) : 0) + 1;
data/efl-1.25.1/src/bin/efl/efl_debugd.c:349:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  STORE(tmp, c->app_name, strlen(c->app_name) + 1);
data/efl-1.25.1/src/bin/efl/efl_debugd.c:375:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = strlen(ops_buf) + 1;
data/efl-1.25.1/src/bin/efl/efl_debugd.c:553:11:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
   mask = umask(S_IRWXG | S_IRWXO);
data/efl-1.25.1/src/bin/efl/efl_debugd.c:592:4:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
   umask(mask);
data/efl-1.25.1/src/bin/efl/efl_debugd.c:637:4:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
   umask(mask);
data/efl-1.25.1/src/bin/efreet/efreet_desktop_cache_create.c:196:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(id, fname, PATH_MAX);
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:639:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(tmp) + 1;
data/efl-1.25.1/src/bin/efreet/efreet_icon_cache_create.c:668:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(tmp) + 1;
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:104:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:122:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf2, p, p2 - p);
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:138:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(buf3, p, p2 - p);
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:163:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:177:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf2, p, p2 - p);
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:191:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf3, p, p2 - p);
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:275:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mimes_str_len += strlen(s) + 1;
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:281:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        extn_mimes_str_len += strlen(s) + 1;
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:287:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        glob_mimes_str_len += strlen(s) + 1;
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:343:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (fwrite(s, strlen(s) + 1, 1, f) != 1)
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:348:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (fwrite(s, strlen(s) + 1, 1, f) != 1)
data/efl-1.25.1/src/bin/efreet/efreet_mime_cache_create.c:353:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (fwrite(s, strlen(s) + 1, 1, f) != 1)
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:105:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(*dir, path, p - path);
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:123:9:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
   if ((fscanf(p, "%4095s\n", buf) == 1) &&
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:124:9:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
       (fscanf(p, "%4095s\n", func) == 1))
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:213:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(s);
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:257:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   filestart += strlen("(in ");
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:261:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   basestart += strlen(" ");
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:449:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(bt->bin_dir);
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:451:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(bt->bin_name);
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:454:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(bt->file_dir);
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:456:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(bt->file_name);
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:460:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/efl-1.25.1/src/bin/eina/eina_btlog/eina_btlog.c:463:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(bt->func_name);
data/efl-1.25.1/src/bin/eldbus/client.c:72:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!eina_simple_xml_parse(xml_buf, strlen(xml_buf), EINA_TRUE,
data/efl-1.25.1/src/bin/eldbus/parser.c:146:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strncmp(iface->name, DBUS_INTERFACE, strlen(DBUS_INTERFACE)))
data/efl-1.25.1/src/bin/eldbus/utils.c:23:19:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((data = fgetc(xml_handler)) != EOF)
data/efl-1.25.1/src/bin/eldbus/utils.c:55:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buffer, strlen(buffer), 1, file_handler) < 1)
data/efl-1.25.1/src/bin/eldbus/utils.c:130:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   for (i = strlen(string) - 1; i && amount > found; i--)
data/efl-1.25.1/src/bin/elementary/config.c:1167:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                  strncpy(n, theme_search_order, p - theme_search_order);
data/efl-1.25.1/src/bin/elementary/config.c:2304:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (strncmp(start , t->name, len) || (strlen(t->name) != len)) continue;
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:340:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:349:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, source_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:363:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:402:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, source_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:406:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:426:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (fwrite(buf, strlen(buf), 1, source_fd) != 1)             \
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:430:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (fwrite(buf, strlen(buf), 1, header_fd) != 1)             \
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:437:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:575:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, source_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:581:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:587:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:605:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, source_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:610:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, source_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:616:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:622:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:627:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (fwrite(buf, strlen(buf), 1, header_fd) != 1)
data/efl-1.25.1/src/bin/elementary/elementary_codegen.c:694:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen (sig))
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_mem.c:32:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       file_in, line, strlen(s) + 1, strerror(errno), s);
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:380:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(tok, tok_start, tok_end - tok_start + 1);
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:392:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memmove(p, p + 1, strlen(p));
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:396:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memmove(p, p + 1, strlen(p));
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:401:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memmove(p, p + 1, strlen(p));
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:406:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memmove(p, p + 1, strlen(p));
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:453:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   top_length = strlen(top);
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:610:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                            strncpy(v, verbatim_1, l);
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:664:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (data && (read(fd, data, size) == size))
data/efl-1.25.1/src/bin/elementary/elm_prefs_cc_parse.c:1372:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((size - 1) < strlen(in))
data/efl-1.25.1/src/bin/elementary/quicklaunch.c:28:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define LENGTH_OF_SOCKADDR_UN(s) (strlen((s)->sun_path) + (size_t)(((struct sockaddr_un *)NULL)->sun_path))
data/efl-1.25.1/src/bin/elementary/quicklaunch.c:116:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (read(fd, buf, bytes) != (int)bytes)
data/efl-1.25.1/src/bin/elementary/quicklaunch.c:243:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(buf);
data/efl-1.25.1/src/bin/elementary/quicklaunch.c:364:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
             num = read(fd, &bytes, sizeof(unsigned long));
data/efl-1.25.1/src/bin/elementary/run.c:28:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define LENGTH_OF_SOCKADDR_UN(s) (strlen((s)->sun_path) + (size_t)(((struct sockaddr_un *)NULL)->sun_path))
data/efl-1.25.1/src/bin/elementary/run.c:68:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(socket_unix.sun_path, buf, sizeof(socket_unix.sun_path));
data/efl-1.25.1/src/bin/elementary/run.c:83:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int exelen = strlen(argv[0]);
data/efl-1.25.1/src/bin/elementary/run.c:100:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                            strncpy(buf, pp, len);
data/efl-1.25.1/src/bin/elementary/run.c:101:29:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
                            strcpy(buf + len, "/");
data/efl-1.25.1/src/bin/elementary/run.c:166:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        slen += strlen(sargv[i]) + 1;
data/efl-1.25.1/src/bin/elementary/run.c:174:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        slen += strlen(environ[i]) + 1;
data/efl-1.25.1/src/bin/elementary/run.c:181:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   slen += strlen(cwd) + 1;
data/efl-1.25.1/src/bin/elementary/run.c:199:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pos += strlen(sargv[i]) + 1;
data/efl-1.25.1/src/bin/elementary/run.c:209:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pos += strlen(environ[i]) + 1;
data/efl-1.25.1/src/bin/elementary/test.c:643:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(name);
data/efl-1.25.1/src/bin/elementary/test_cnp.c:16:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         ELM_SEL_FORMAT_TEXT, txt, strlen(txt));
data/efl-1.25.1/src/bin/elementary/test_cnp.c:42:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(stripstr, (char *)ev->data, ev->len);
data/efl-1.25.1/src/bin/elementary/test_code.c:23:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(line);
data/efl-1.25.1/src/bin/elementary/test_combobox.c:86:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strlen((char *)key)) return EINA_TRUE;
data/efl-1.25.1/src/bin/elementary/test_config.c:87:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (strlen(buf) >= (sizeof(buf) - 3)) break;
data/efl-1.25.1/src/bin/elementary/test_config.c:89:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (strlen(buf) >= (sizeof(buf) - 1 - strlen(profiles[i]))) break;
data/efl-1.25.1/src/bin/elementary/test_config.c:89:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (strlen(buf) >= (sizeof(buf) - 1 - strlen(profiles[i]))) break;
data/efl-1.25.1/src/bin/elementary/test_config.c:92:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(buf) < (sizeof(buf) - 5)) strcat(buf, "</b>");
data/efl-1.25.1/src/bin/elementary/test_entry.c:2215:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   elm_spinner_min_max_set(sp, 0, strlen(elm_object_text_get(en)));
data/efl-1.25.1/src/bin/elementary/test_entry.c:2365:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   elm_spinner_min_max_set(sp, 0, strlen(elm_object_text_get(en)));
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:723:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return strlen(ti1->path) - strlen(ti2->path);
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:723:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return strlen(ti1->path) - strlen(ti2->path);
data/efl-1.25.1/src/bin/elementary/test_gengrid.c:1432:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!str || !strlen(str)) return;
data/efl-1.25.1/src/bin/elementary/test_genlist.c:4069:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!str || !strlen(str)) return;
data/efl-1.25.1/src/bin/elementary/test_genlist.c:5208:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strlen((char *)key)) return EINA_TRUE;
data/efl-1.25.1/src/bin/elementary/test_genlist.c:5237:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strlen(buf))
data/efl-1.25.1/src/bin/elementary/test_index.c:494:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(str);
data/efl-1.25.1/src/bin/elementary/test_index.c:510:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(str);
data/efl-1.25.1/src/bin/elementary/test_label.c:452:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sprintf(status + strlen(status),"Max   : %d<br>",max);
data/efl-1.25.1/src/bin/elementary/test_label.c:453:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sprintf(status + strlen(status),"Min   : %d<br>",min);
data/efl-1.25.1/src/bin/elementary/test_label.c:454:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sprintf(status + strlen(status),"Step  : %d<br>",step);
data/efl-1.25.1/src/bin/elementary/test_label.c:455:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sprintf(status + strlen(status),"Array  : [ ");
data/efl-1.25.1/src/bin/elementary/test_label.c:459:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           sprintf(status + strlen(status)," %d,",size_array[i]);
data/efl-1.25.1/src/bin/elementary/test_label.c:463:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(status + strlen(status)," ... ");
data/efl-1.25.1/src/bin/elementary/test_label.c:464:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sprintf(status + strlen(status)," ]");
data/efl-1.25.1/src/bin/elementary/test_label.c:466:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sprintf(status + strlen(status),"<br>");
data/efl-1.25.1/src/bin/elementary/test_label.c:467:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sprintf(status + strlen(status),"%s",styles_names[app->i_style]);
data/efl-1.25.1/src/bin/elementary/test_store.c:200:14:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
             strncat(content_pos, buf, content_end - content_pos - 1);
data/efl-1.25.1/src/bin/elementary/test_store.c:201:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             content_pos = content + strlen(content);
data/efl-1.25.1/src/bin/elementary/test_win_keygrab.c:61:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(api->keyname, str, PATH_MAX - 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:591:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	 strncpy(str, argv[i], sizeof(str) - 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:594:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 len = strlen(str);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:661:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(path, root, sizeof(path) - 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:675:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(path) < (sizeof(path) - 1 - 8))
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:681:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(path) == (sizeof(path) - 1 -1))
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:683:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(path);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:987:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(symname) <= sNAMEMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1029:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     assert(strlen(firstname) <= sNAMEMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1030:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	     strncpy(name, firstname, sNAMEMAX);	/* save symbol name */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1040:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     assert(strlen(str) <= sNAMEMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1041:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	     strncpy(name, str, sNAMEMAX);	/* save symbol name */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1179:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(str) <= sNAMEMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1180:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(name, str, sNAMEMAX);	/* save symbol name */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1561:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(constname, str, sizeof(constname) - 1);	/* save symbol name */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1612:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(enumname, str, sizeof(enumname) - 1);	/* save enum name (last constant) */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:1658:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(constname, str, sNAMEMAX); /* save symbol name */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2096:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        assert(strlen(str) <= sNAMEMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2131:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  if (strlen(str) > sEXPMAX)
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2194:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(firstname) <= sNAMEMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2219:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     assert(strlen(str) <= sNAMEMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2486:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		  strncpy(name, ptr, sizeof(name) - 1);	/* save symbol name */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:2645:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(arg->name, name, sizeof(arg->name) - 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:3039:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(cur->name, name, sizeof(cur->name) - 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:3812:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(labelname, itoh(lbl_exit), sizeof(labelname) - 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc1.c:3818:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(labelname, itoh(lbl_case), sizeof(labelname) - 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:294:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		     memmove(line, sptr, strlen(sptr) + 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:317:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     num -= strlen(line);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:318:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     line += strlen(line);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:741:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   assert(strlen(pline) < sLINEMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1020:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    if (strlen(name) > sEXPMAX)
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1224:30:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                             strncpy(s2, sc_tokens[tok - tFIRST], 19);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1344:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  if (!delete_subst(str, strlen(str)))
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1462:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t              length = strlen(str);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1473:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t              destlen = strlen(dest);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1475:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   assert(srclen <= strlen(src));
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1535:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		  strncpy(args[arg], s, len);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1608:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		     len += strlen(args[arg]);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1617:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(line) + len - (int)(s - line) > buffersize)
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1633:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strins(s, args[arg], strlen(args[arg]));
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:1634:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    s += strlen(args[arg]);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:2184:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(s1, sc_tokens[token - tFIRST], 19); /* multi-character symbol */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:2190:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
             strncpy(s2, "-end of file-", 19);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:2199:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(s2, sc_tokens[_lextok - tFIRST], 19);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:2514:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int                 len = strlen(name);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc2.c:2697:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(entry.name, name, sizeof(entry.name) - 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:160:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	     strcpy(opername, "=");
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:173:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		       strncpy(opername, binoperstr[i], sizeof(opername) - 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:194:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		       strncpy(opername, unoperstr[i], sizeof(opername) - 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:1304:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!val && find_subst(st, strlen(st)))
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc3.c:1720:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(st) < sizeof lastsymbol);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc4.c:145:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (strlen(name) + sizeof(cell)) & ~(sizeof(cell) - 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:347:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(params);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:620:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(str, instr, maxlen);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:692:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     assert(strlen(sym->name) <= sNAMEMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:722:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     nametablesize += strlen(alias) + 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:736:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     nametablesize += strlen(constptr->name) + 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:749:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     nametablesize += strlen(constptr->name) + 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:835:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sc_writebin(fout, sym->name, strlen(sym->name) + 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:836:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     nameofs += strlen(sym->name) + 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:878:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  assert(strlen(sym->name) <= sNAMEMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:893:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sc_writebin(fout, alias, strlen(alias) + 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:894:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     nameofs += strlen(alias) + 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:919:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sc_writebin(fout, constptr->name, strlen(constptr->name) + 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:920:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     nameofs += strlen(constptr->name) + 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:944:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sc_writebin(fout, sym->name, strlen(sym->name) + 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:945:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     nameofs += strlen(sym->name) + 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:969:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sc_writebin(fout, constptr->name, strlen(constptr->name) + 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc6.c:970:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     nameofs += strlen(constptr->name) + 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:176:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	CHECK_STGBUFFER(strlen(stgbuf) + strlen(st) + 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:176:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	CHECK_STGBUFFER(strlen(stgbuf) + strlen(st) + 1);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:178:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(stgbuf);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:280:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    start += strlen(start) + 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:298:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ptr += strlen(ptr) + 1;
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:397:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(len == (int)(strlen(str) + 1));
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:405:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(len == (int)(strlen(str) + 1));
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:540:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     *repl_length += strlen(symbols[var]);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:574:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     sptr += strlen(symbols[var]);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sc7.c:675:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	start += strlen(start) + 1;	/* to next string */
data/efl-1.25.1/src/bin/embryo/embryo_cc_sclist.c:143:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   assert(strlen(name) <= sNAMEMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sclist.c:145:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   assert(strlen(alias) <= sEXPMAX);
data/efl-1.25.1/src/bin/embryo/embryo_cc_sclist.c:146:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!(cur = insert_stringpair(&alias_tab, name, alias, strlen(name))))
data/efl-1.25.1/src/bin/embryo/embryo_cc_sclist.c:155:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      find_stringpair(alias_tab.next, name, strlen(name));
data/efl-1.25.1/src/bin/embryo/embryo_cc_sclist.c:158:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(cur->second) <= sEXPMAX);
data/efl-1.25.1/src/bin/eolian/docs.c:272:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        curl += strlen(since) + sizeof(" * @since ") - 1;
data/efl-1.25.1/src/bin/eolian/docs.c:291:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        curl += strlen(el) + sizeof(" * ") - 1;
data/efl-1.25.1/src/bin/eolian/docs.c:652:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        curl += strlen(nm);
data/efl-1.25.1/src/bin/eolian/headers.c:33:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (prtn[strlen(prtn) - 1] != '*')
data/efl-1.25.1/src/bin/eolian/headers.c:127:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (rtps[strlen(rtps) - 1] != '*')
data/efl-1.25.1/src/bin/eolian/main.c:130:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t blen = strlen(basen),
data/efl-1.25.1/src/bin/eolian/main.c:131:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          elen = strlen(ext);
data/efl-1.25.1/src/bin/eolian/main.c:137:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t dlen = strlen(_dexts[i]);
data/efl-1.25.1/src/bin/eolian/main.c:166:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(iname, fname, sizeof(iname) - 1);
data/efl-1.25.1/src/bin/eolian/sources.c:25:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t flen = strlen(fname);
data/efl-1.25.1/src/bin/eolian/sources.c:49:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t tlen = strlen(tname);
data/efl-1.25.1/src/bin/eolian/sources.c:415:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   const char *starsp = (ct[strlen(ct) - 1] != '*') ? " " : "";
data/efl-1.25.1/src/bin/eolian/sources.c:453:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   const char *starsp = (ct[strlen(ct) - 1] != '*') ? " " : "";
data/efl-1.25.1/src/bin/eolian/sources.c:607:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           if (ptn[strlen(ptn) - 1] != '*')
data/efl-1.25.1/src/bin/eolian/sources.c:676:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             Eina_Bool had_star = ptn[strlen(ptn) - 1] == '*';
data/efl-1.25.1/src/bin/eolian/sources.c:769:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (rtpn[strlen(rtpn) - 1] != '*')
data/efl-1.25.1/src/bin/eolian/sources.c:806:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (rtpn[strlen(rtpn) - 1] != '*')
data/efl-1.25.1/src/bin/eolian/sources.c:1278:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           if (ptn[strlen(ptn) - 1] != '*')
data/efl-1.25.1/src/bin/eolian/sources.c:1313:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             Eina_Bool had_star = ptn[strlen(ptn) - 1] == '*';
data/efl-1.25.1/src/bin/eolian/sources.c:1413:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(efname) >= (sizeof("destructor") - 1) && !impl_same_class)
data/efl-1.25.1/src/bin/eolian/sources.c:1414:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (!strcmp(efname + strlen(efname) - sizeof("destructor") + 1, "destructor"))
data/efl-1.25.1/src/bin/eolian/types.c:58:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              strlen(nl));
data/efl-1.25.1/src/bin/eolian/types.c:112:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             strlen(nl));
data/efl-1.25.1/src/bin/ethumb_client/ethumbd.c:409:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     len = strlen(str) + 1;
data/efl-1.25.1/src/bin/ethumb_client/ethumbd.c:1040:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size = strlen(string) + 1;
data/efl-1.25.1/src/bin/ethumb_client/ethumbd_slave.c:73:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = getc(stream);
data/efl-1.25.1/src/bin/ethumb_client/ethumbd_slave.c:226:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     size_path = strlen(thumb_path) + 1;
data/efl-1.25.1/src/bin/ethumb_client/ethumbd_slave.c:231:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     size_key = strlen(thumb_key) + 1;
data/efl-1.25.1/src/bin/exactness/common.h:73:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int __len = (__s ? strlen(__s) : 0) + 1; \
data/efl-1.25.1/src/bin/exactness/common.h:94:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int __len = (__s ? strlen(__s) : 0) + 1; \
data/efl-1.25.1/src/bin/exactness/exactness.c:113:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char *filename1 = alloca(strlen(orig_dir) + strlen(ent_name) + 20);
data/efl-1.25.1/src/bin/exactness/exactness.c:113:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char *filename1 = alloca(strlen(orig_dir) + strlen(ent_name) + 20);
data/efl-1.25.1/src/bin/exactness/exactness.c:114:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char *filename2 = alloca(strlen(_dest_dir) + strlen(ent_name) + 20);
data/efl-1.25.1/src/bin/exactness/exactness.c:114:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char *filename2 = alloca(strlen(_dest_dir) + strlen(ent_name) + 20);
data/efl-1.25.1/src/bin/exactness/exactness.c:123:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *buf = alloca(strlen(_dest_dir) + strlen(ent_name));
data/efl-1.25.1/src/bin/exactness/exactness.c:123:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *buf = alloca(strlen(_dest_dir) + strlen(ent_name));
data/efl-1.25.1/src/bin/exactness/exactness.c:150:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *filename = alloca(strlen(dir) + strlen(ent_name) + 20);
data/efl-1.25.1/src/bin/exactness/exactness.c:150:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *filename = alloca(strlen(dir) + strlen(ent_name) + 20);
data/efl-1.25.1/src/bin/exactness/exactness.c:168:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char *origdir = alloca(strlen(_dest_dir) + 20);
data/efl-1.25.1/src/bin/exactness/exactness.c:190:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             currentdir = alloca(strlen(_dest_dir) + 20);
data/efl-1.25.1/src/bin/exactness/exactness.c:259:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(buf, eina_strbuf_string_get(sbuf), SCHEDULER_CMD_SIZE-1);
data/efl-1.25.1/src/bin/exactness/injector.c:154:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              len += t->keyname ? strlen(t->keyname) : 0;
data/efl-1.25.1/src/bin/exactness/injector.c:155:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              len += t->key ? strlen(t->key) : 0;
data/efl-1.25.1/src/bin/exactness/injector.c:156:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              len += t->string ? strlen(t->string) : 0;
data/efl-1.25.1/src/bin/exactness/injector.c:157:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              len += t->compose ? strlen(t->compose) : 0;
data/efl-1.25.1/src/bin/exactness/injector.c:184:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              len += t->wdg_name ? strlen(t->wdg_name) : 0;
data/efl-1.25.1/src/bin/exactness/injector.c:185:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              len += t->event_name ? strlen(t->event_name) : 0;
data/efl-1.25.1/src/bin/exactness/injector.c:198:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              len += t->wdg_name ? strlen(t->wdg_name) : 0;
data/efl-1.25.1/src/bin/exactness/injector.c:244:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strcmp(_src_filename + strlen(_src_filename) - 4,".exu"))
data/efl-1.25.1/src/bin/exactness/injector.c:296:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf) + 1;
data/efl-1.25.1/src/bin/exactness/player.c:198:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             dir_name_len = strlen(_dest) + 1; /* includes space of a '/' */
data/efl-1.25.1/src/bin/exactness/player.c:199:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             filename = malloc(strlen(_test_name) + strlen(IMAGE_FILENAME_EXT) +
data/efl-1.25.1/src/bin/exactness/player.c:199:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             filename = malloc(strlen(_test_name) + strlen(IMAGE_FILENAME_EXT) +
data/efl-1.25.1/src/bin/exactness/player.c:821:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   unsigned int len = strlen(prefix);
data/efl-1.25.1/src/bin/exactness/player.c:822:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strncmp(name, prefix, len) && (strlen(name) > len) && (name[len] == SHOT_DELIMITER))
data/efl-1.25.1/src/bin/exactness/player.c:824:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        unsigned int length = strlen(path) + strlen(name) + 2;
data/efl-1.25.1/src/bin/exactness/player.c:824:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        unsigned int length = strlen(path) + strlen(name) + 2;
data/efl-1.25.1/src/bin/exactness/player.c:889:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strcmp(_dest + strlen(_dest) - 4,".exu"))
data/efl-1.25.1/src/bin/exactness/player.c:926:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strcmp(_src_filename + strlen(_src_filename) - 4,".exu"))
data/efl-1.25.1/src/examples/ecore/ecore_audio_playback.c:180:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   bread = read(fd, buf, sizeof(buf));
data/efl-1.25.1/src/examples/ecore/ecore_compose_get_example.c:60:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           ev->keyname, ev->key, ev->string, ev->compose, (ev->compose) ? strlen(ev->compose) : (size_t)-1, (ev->compose) ? *(ev->compose) : -1,
data/efl-1.25.1/src/examples/ecore/ecore_compose_get_example.c:128:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    printf(" ** string : %s %zu 0x%hhx%hhX\n", string, strlen(string), string[1], string[0]);
data/efl-1.25.1/src/examples/ecore/ecore_con_client_example.c:69:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        r = strlen(line);
data/efl-1.25.1/src/examples/ecore/ecore_con_client_example.c:86:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t clen = strlen(starttls_local_command);
data/efl-1.25.1/src/examples/ecore/ecore_con_client_example.c:142:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     ecore_con_server_send(ev->server, "hello!", strlen("hello!"));
data/efl-1.25.1/src/examples/ecore/ecore_con_eet_server_example.c:56:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          strlen(toSend));
data/efl-1.25.1/src/examples/ecore/ecore_con_server_example.c:32:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ecore_con_client_send(ev->client, "Hello World!", strlen("Hello World!"));
data/efl-1.25.1/src/examples/ecore/ecore_con_server_example.c:38:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             ecore_con_client_send(ev->client, upgrade_msg, strlen(upgrade_msg));
data/efl-1.25.1/src/examples/ecore/ecore_con_server_example.c:71:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (do_ssl_upgrade && ((size_t)ev->size == strlen(upgrade_ssl)) &&
data/efl-1.25.1/src/examples/ecore/ecore_con_server_http_example.c:44:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ecore_con_client_send(ev->client, buf, strlen(buf));
data/efl-1.25.1/src/examples/ecore/ecore_con_url_headers_example.c:92:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     r = ecore_con_url_post(ec_url, post_data, strlen(post_data), NULL);
data/efl-1.25.1/src/examples/ecore/ecore_evas_ews_example.c:85:12:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   int c = getchar();
data/efl-1.25.1/src/examples/ecore/ecore_evas_extn_plug_example.c:95:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(txt);
data/efl-1.25.1/src/examples/ecore/ecore_evas_extn_plug_example.c:99:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (text && (size == (int)strlen(txt)))
data/efl-1.25.1/src/examples/ecore/ecore_evas_extn_socket_example.c:97:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(buf);
data/efl-1.25.1/src/examples/ecore/ecore_exe_example.c:23:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(msg, dataFromProcess->data, dataFromProcess->size);
data/efl-1.25.1/src/examples/ecore/ecore_exe_example.c:47:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (ecore_exe_send(childHandle, msg, strlen(msg)) != EINA_TRUE)
data/efl-1.25.1/src/examples/ecore/ecore_fd_handler_example.c:37:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   nbytes = read(fd, buf, sizeof(buf));
data/efl-1.25.1/src/examples/ecore/ecore_fd_handler_gnutls_example.c:207:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   gnutls_server_name_set(client, GNUTLS_NAME_DNS, "www.verisign.com", strlen("www.verisign.com"));
data/efl-1.25.1/src/examples/ecore/ecore_imf_example.c:303:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(preedit_string) > 0)
data/efl-1.25.1/src/examples/ecore/ecore_ipc_client_example.c:68:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        r = strlen(line);
data/efl-1.25.1/src/examples/ecore/ecore_ipc_server_example.c:23:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              "Hello World!", strlen("Hello World!"));
data/efl-1.25.1/src/examples/ecore/efl_exe.c:67:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   Eina_Slice slice = { strlen(buf2), .mem = buf2 };
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:465:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(input_fname, "tcp://", strlen("tcp://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:471:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char *address = input_fname + strlen("tcp://");
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:492:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(input_fname, "http://", strlen("http://")) == 0 ||
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:493:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncmp(input_fname, "https://", strlen("https://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:518:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(input_fname, "ws://", strlen("ws://")) == 0 ||
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:519:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncmp(input_fname, "wss://", strlen("wss://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:543:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(input_fname, "udp://", strlen("udp://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:549:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char *bind_address = input_fname + strlen("udp://");
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:576:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(input_fname, "unix://", strlen("unix://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:582:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char *address = input_fname + strlen("unix://");
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:605:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(input_fname, "windows://", strlen("windows://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:611:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char *address = input_fname + strlen("windows://");
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:633:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(input_fname, "ssl://", strlen("ssl://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:639:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char *address = input_fname + strlen("ssl://");
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:744:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(output_fname, "tcp://", strlen("tcp://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:750:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char *address = output_fname + strlen("tcp://");
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:771:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(output_fname, "http://", strlen("http://")) == 0 ||
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:772:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncmp(output_fname, "https://", strlen("https://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:797:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(output_fname, "ws://", strlen("ws://")) == 0 ||
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:798:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncmp(output_fname, "wss://", strlen("wss://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:822:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(output_fname, "udp://", strlen("udp://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:828:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char *address = output_fname + strlen("udp://");
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:850:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(output_fname, "unix://", strlen("unix://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:856:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char *address = output_fname + strlen("unix://");
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:879:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(output_fname, "windows://", strlen("windows://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:885:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char *address = output_fname + strlen("windows://");
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:907:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (strncmp(output_fname, "ssl://", strlen("ssl://")) == 0)
data/efl-1.25.1/src/examples/ecore/efl_io_copier_example.c:913:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char *address = output_fname + strlen("ssl://");
data/efl-1.25.1/src/examples/ecore/efl_net_control_example.c:493:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  len = strlen(name);
data/efl-1.25.1/src/examples/ecore/efl_net_control_example.c:511:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  len = strlen(ssid);
data/efl-1.25.1/src/examples/ecore/efl_net_control_example.c:531:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  len = strlen(username);
data/efl-1.25.1/src/examples/ecore/efl_net_control_example.c:553:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  len = strlen(passphrase);
data/efl-1.25.1/src/examples/ecore/efl_net_control_example.c:571:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  len = strlen(wps);
data/efl-1.25.1/src/examples/ecore/efl_net_dialer_websocket_autobahntestee.c:172:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           efl_name_get(dialer), strlen(text), text);
data/efl-1.25.1/src/examples/ecore/efl_net_socket_ssl_dialer_example.c:89:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        slice.len = len = strlen(slice.mem);
data/efl-1.25.1/src/examples/ecore/efl_net_socket_ssl_dialer_example.c:103:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (pending_send_offset == strlen(pending_send->data))
data/efl-1.25.1/src/examples/ecore/efl_thread.c:42:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             Eina_Slice slice = { strlen(buf2), .mem = buf2 };
data/efl-1.25.1/src/examples/ecore/efl_thread.c:93:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        Eina_Slice slice = { strlen(buf2), .mem = buf2 };
data/efl-1.25.1/src/examples/ecore/efl_thread.c:189:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        Eina_Slice slice = { strlen(buf2), .mem = buf2 };
data/efl-1.25.1/src/examples/edje/edje-dynamic-multiseat.c:64:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sig = emission + strlen("seat,");
data/efl-1.25.1/src/examples/edje/edje-multiseat.c:141:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   seat_name_str = emission + strlen("drag,start,");
data/efl-1.25.1/src/examples/edje/edje-multiseat.c:176:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sig = emission + strlen("seat,");
data/efl-1.25.1/src/examples/edje/edje-text.c:87:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   s = malloc(10 + strlen(lang[lang_idx]));
data/efl-1.25.1/src/examples/eet/eet-basic.c:23:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   eet_write(ef, "Entry 1", entries[0], strlen(entries[0]) + 1, 0);
data/efl-1.25.1/src/examples/eet/eet-basic.c:24:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   eet_write(ef, "Entry 2", entries[1], strlen(entries[1]) + 1, 1);
data/efl-1.25.1/src/examples/eet/eet-basic.c:25:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   eet_write(ef, "Entry 3", entries[2], strlen(entries[2]) + 1, 0);
data/efl-1.25.1/src/examples/eet/eet-data-cipher_decipher.c:45:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!eet_write_cipher(ef, "keys/tests", buffer, strlen(buffer) + 1, 0, key))
data/efl-1.25.1/src/examples/eet/eet-data-cipher_decipher.c:72:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (size != (int)strlen(buffer) + 1)
data/efl-1.25.1/src/examples/eet/eet-data-cipher_decipher.c:79:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (memcmp(test, buffer, strlen(buffer) + 1) != 0)
data/efl-1.25.1/src/examples/eet/eet-data-cipher_decipher.c:99:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (size == (int)strlen(buffer) + 1)
data/efl-1.25.1/src/examples/eet/eet-data-cipher_decipher.c:100:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (memcmp(test, buffer, strlen(buffer) + 1) == 0)
data/efl-1.25.1/src/examples/eet/eet-file.c:46:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(buf);
data/efl-1.25.1/src/examples/eet/eet-file.c:52:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(some_strings[i]) + 1;
data/efl-1.25.1/src/examples/eina/eina_array_02.c:11:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen((const char*)data) <= 5)
data/efl-1.25.1/src/examples/eina/eina_hash_02.c:98:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return (int)strlen(key) + 1;
data/efl-1.25.1/src/examples/eina/eina_simple_xml_parser_01.c:79:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if(!strncmp("post", content, strlen("post")))
data/efl-1.25.1/src/examples/eina/eina_simple_xml_parser_01.c:86:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp("login>", content, strlen("login>")))
data/efl-1.25.1/src/examples/eina/eina_simple_xml_parser_01.c:90:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp("message>", content, strlen("message>")))
data/efl-1.25.1/src/examples/eina/eina_simple_xml_parser_02.c:25:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp("Group", content, strlen("Group")))
data/efl-1.25.1/src/examples/eina/eina_simple_xml_parser_02.c:27:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp("Label", content, strlen("Label")))
data/efl-1.25.1/src/examples/eina/eina_str_01.c:50:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   eina_str_join_len(prologue, 106, ' ', part1, strlen(part1), part2, strlen(part2));
data/efl-1.25.1/src/examples/eina/eina_str_01.c:50:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   eina_str_join_len(prologue, 106, ' ', part1, strlen(part1), part2, strlen(part2));
data/efl-1.25.1/src/examples/eina/eina_xattr_01.c:80:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret = eina_xattr_set(argv[2], argv[3], argv[4], strlen(argv[4]), 0);
data/efl-1.25.1/src/examples/eio/eio_file_ls.c:16:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (last_slash != NULL && strlen(last_slash) > 1 && last_slash[1] == '.')
data/efl-1.25.1/src/examples/elementary/combobox_example_01.c:68:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strlen((char *)key)) return EINA_TRUE;
data/efl-1.25.1/src/examples/elementary/efl_thread_1.c:29:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(1000);
data/efl-1.25.1/src/examples/elementary/efl_thread_2.c:37:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(1000);
data/efl-1.25.1/src/examples/elementary/efl_thread_3.c:40:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(1000);
data/efl-1.25.1/src/examples/elementary/efl_thread_4.c:43:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(1000);
data/efl-1.25.1/src/examples/elementary/efl_thread_5.c:36:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(1000);
data/efl-1.25.1/src/examples/elementary/entry_example.c:410:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ptr = s + strlen(what);
data/efl-1.25.1/src/examples/elementary/genlist_example_02.c:21:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        n = strlen(buf);
data/efl-1.25.1/src/examples/elementary/genlist_example_03.c:23:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        n = strlen(buf);
data/efl-1.25.1/src/examples/elementary/genlist_example_04.c:25:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        n = strlen(buf);
data/efl-1.25.1/src/examples/elementary/web_example_02.c:97:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     strncpy(buf, title, sizeof(buf) - 1);
data/efl-1.25.1/src/examples/evas/evas-images3.c:122:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if (!equal)
data/efl-1.25.1/src/generic/evas/pdf/main.cpp:273:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  generated = eina_tmpstr_add_length(filename, strlen(filename) - strlen(extension));
data/efl-1.25.1/src/generic/evas/pdf/main.cpp:273:83:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  generated = eina_tmpstr_add_length(filename, strlen(filename) - strlen(extension));
data/efl-1.25.1/src/generic/evas/rsvg/main.c:28:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int i, len = strlen(file);
data/efl-1.25.1/src/lib/ecore/ecore_anim.c:34:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define pipe_read(fd, buffer, size)  read((fd), buffer, size)
data/efl-1.25.1/src/lib/ecore/ecore_anim.c:250:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                            if (read(timerfd, &timerfdbuf, sizeof(timerfdbuf)) == -1)
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:484:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
             E_NO_ERRNO(result, read(statusPipe[0], &buf, 1), ok);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:1034:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(exe_cmd);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:1060:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         len = strlen(exe_cmd);
data/efl-1.25.1/src/lib/ecore/ecore_exe_posix.c:1185:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         if ((num = read(child_fd, buf, READBUFSIZ)) < 1)
data/efl-1.25.1/src/lib/ecore/ecore_exe_win32.c:88:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   Eina_Bool   read : 1;
data/efl-1.25.1/src/lib/ecore/ecore_exe_win32.c:97:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   Eina_Bool      read : 1;
data/efl-1.25.1/src/lib/ecore/ecore_exe_win32.c:116:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (tdat->read)
data/efl-1.25.1/src/lib/ecore/ecore_exe_win32.c:192:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (trep->read)
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:255:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   prglen = strlen(prg);
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:256:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   verlen = strlen(ver);
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:266:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             _ecore_getopt_help_line(fp, 0, cols, used, p, strlen(p));
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:304:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     (fp, 3, cols, 3, txt, strlen(txt));
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:316:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     (fp, 3, cols, 3, txt, strlen(txt));
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:369:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *metavarlen = strlen(txt);
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:380:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *metavarlen = strlen(desc->longname);
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:499:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       (fp, base, total, used, _("Type: "), strlen(_("Type: ")));
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:512:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = str ? strlen(str) : 0;
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:517:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(str);
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:575:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       (fp, base, total, used, _("Default: "), strlen(_("Default: ")));
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:602:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       (fp, base, total, used, _("Choices: "), strlen(_("Choices: ")));
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:607:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (fp, base, total, used, *itr, strlen(*itr));
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:641:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  strlen(_("No categories available.")));
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:645:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       (fp, base, total, used, _("Categories: "), strlen(_("Categories: ")));
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:654:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             (fp, base, total, used, desc->longname, strlen(desc->longname));
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:702:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int namelen = strlen(desc->longname);
data/efl-1.25.1/src/lib/ecore/ecore_getopt.c:729:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       (fp, helpcol, cols, used, desc->help, strlen(desc->help));
data/efl-1.25.1/src/lib/ecore/ecore_main.c:270:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
   usleep(pd->throttle);
data/efl-1.25.1/src/lib/ecore/ecore_main.c:747:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
             int r = read(pd->timer_fd, &count, sizeof count);
data/efl-1.25.1/src/lib/ecore/ecore_main.c:2680:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   int c = getc(stdin);
data/efl-1.25.1/src/lib/ecore/ecore_main_timechanges.c:30:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (read(fd, buf, sizeof(buf)) >= 0) return;
data/efl-1.25.1/src/lib/ecore/ecore_pipe.c:57:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define pipe_read(fd, buffer, size)  read((fd), buffer, size)
data/efl-1.25.1/src/lib/ecore/ecore_signal.c:64:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
             ret = read(sig_pipe[i][0], &sdata, sizeof(sdata));
data/efl-1.25.1/src/lib/ecore/ecore_thread.c:529:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
   usleep(50);
data/efl-1.25.1/src/lib/ecore/ecore_thread.c:632:14:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
             usleep(1000);
data/efl-1.25.1/src/lib/ecore/ecore_throttle.c:34:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
   usleep(throttle_val);
data/efl-1.25.1/src/lib/ecore/efl_appthread.c:96:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = read(pd->fd.out, rw_slice->mem, rw_slice->len);
data/efl-1.25.1/src/lib/ecore/efl_core_command_line.c:119:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char *s2 = malloc((strlen(s) * 2) + 1 + 2), *d;
data/efl-1.25.1/src/lib/ecore/efl_core_command_line.c:198:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   for (unsigned int i = 0; i < strlen(command); ++i)
data/efl-1.25.1/src/lib/ecore/efl_core_command_line.c:228:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *param = calloc(1, strlen(content) + 1);
data/efl-1.25.1/src/lib/ecore/efl_exe.c:115:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(cmd);
data/efl-1.25.1/src/lib/ecore/efl_exe.c:137:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(cmd);
data/efl-1.25.1/src/lib/ecore/efl_exe.c:202:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (read(pd->fd.exited_read, &pinfo, sizeof(Ecore_Signal_Pid_Info)) ==
data/efl-1.25.1/src/lib/ecore/efl_exe.c:777:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = read(pd->fd.out, rw_slice->mem, rw_slice->len);
data/efl-1.25.1/src/lib/ecore/efl_io_copier.c:24:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      uint64_t read, written, total;
data/efl-1.25.1/src/lib/ecore/efl_io_copier.c:97:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   uint64_t old_read = pd->progress.read;
data/efl-1.25.1/src/lib/ecore/efl_io_copier.c:111:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if ((old_read != pd->progress.read) ||
data/efl-1.25.1/src/lib/ecore/efl_io_copier.c:700:88:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
_efl_io_copier_progress_get(const Eo *o EINA_UNUSED, Efl_Io_Copier_Data *pd, uint64_t *read, uint64_t *written, uint64_t *total)
data/efl-1.25.1/src/lib/ecore/efl_io_copier.c:702:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (read) *read = pd->progress.read;
data/efl-1.25.1/src/lib/ecore/efl_io_copier.c:702:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (read) *read = pd->progress.read;
data/efl-1.25.1/src/lib/ecore/efl_io_copier.c:731:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   uint64_t old_read = pd->progress.read;
data/efl-1.25.1/src/lib/ecore/efl_io_copier.c:762:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if ((old_read != pd->progress.read) ||
data/efl-1.25.1/src/lib/ecore/efl_io_reader_fd.c:42:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = read(fd, rw_slice->mem, rw_slice->len);
data/efl-1.25.1/src/lib/ecore/efl_loop_fd.c:17:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      unsigned int read;
data/efl-1.25.1/src/lib/ecore/efl_loop_fd.c:62:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   flags |= pd->references.read > 0 ? ECORE_FD_READ : 0;
data/efl-1.25.1/src/lib/ecore/efl_loop_handler.c:26:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      unsigned short read;
data/efl-1.25.1/src/lib/ecore/efl_loop_handler.c:71:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            (pd->references.read > 0)) ? ECORE_FD_READ  : 0) |
data/efl-1.25.1/src/lib/ecore/efl_loop_handler.c:147:56:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        REFERENCES_MAP(EFL_LOOP_HANDLER_EVENT_READ,    read);
data/efl-1.25.1/src/lib/ecore/efl_thread.c:107:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   ret = read(ad->ctrl.out, &cmd, sizeof(Control_Data));
data/efl-1.25.1/src/lib/ecore/efl_thread.c:395:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   ret = read(pd->ctrl.out, &cmd, sizeof(Control_Data));
data/efl-1.25.1/src/lib/ecore/efl_thread.c:910:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = read(pd->fd.out, rw_slice->mem, rw_slice->len);
data/efl-1.25.1/src/lib/ecore_audio/Ecore_Audio.h:140:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int (*read)(void *data, Eo *eo_obj, void *buffer, int length);
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_in.c:130:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (ea_obj->vio && ea_obj->vio->vio->read) {
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_in.c:131:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      len_read = ea_obj->vio->vio->read(ea_obj->vio->data, eo_obj, buf, len);
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_obj_out_pulse.c:324:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      dispenv = malloc(8/*"DISPLAY="*/ + strlen(disp) + 1);
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_sndfile_vio.c:54:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (ea_obj->vio->vio->read)
data/efl-1.25.1/src/lib/ecore_audio/ecore_audio_sndfile_vio.c:55:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return ea_obj->vio->vio->read(ea_obj->vio->data, eo_obj, buffer, count);
data/efl-1.25.1/src/lib/ecore_buffer/ecore_buffer_con.c:29:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strncmp(interface, "bq_mgr", strlen("bq_mgr")))
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:408:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncmp(address, "abstract:", strlen("abstract:")) == 0)
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:410:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             const char *path = address + strlen("abstract:");
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:411:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (strlen(path) + 2 > sizeof(buf))
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:417:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             memcpy(buf + 1, path, strlen(path) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:419:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(path) + 2;
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:423:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (strlen(address) + 1 > sizeof(buf))
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:429:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(address) + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:875:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   host_len = strlen(host);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:889:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        slen = strlen(s);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1218:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        request_len = sizeof(Efl_Net_Socks4_Request) + strlen(proxy_user) + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1224:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             memcpy(request->indent, proxy_user, strlen(proxy_user) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1317:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        request_len = sizeof(Efl_Net_Socks4_Request) + strlen(proxy_user) + 1 + strlen(host) + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1317:81:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        request_len = sizeof(Efl_Net_Socks4_Request) + strlen(proxy_user) + 1 + strlen(host) + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1323:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             memcpy(request->indent, proxy_user, strlen(proxy_user) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1324:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             memcpy(request->indent + strlen(proxy_user) + 1, host, strlen(host) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1324:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             memcpy(request->indent + strlen(proxy_user) + 1, host, strlen(host) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1492:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   uint8_t namelen = strlen(name);
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1552:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   volatile uint8_t user_len = user ? strlen(user) : 0;
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:1553:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   volatile uint8_t pass_len = pass ? strlen(pass) : 0;
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:2130:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     _efl_net_ip_connect_async_run_socks4(d, host, port, proxy + strlen("socks4://"));
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:2132:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     _efl_net_ip_connect_async_run_socks5(d, host, port, proxy + strlen("socks5://"));
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:2134:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     _efl_net_ip_connect_async_run_socks4a(d, host, port, proxy + strlen("socks4a://"));
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:2136:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     _efl_net_ip_connect_async_run_socks5h(d, host, port, proxy + strlen("socks5h://"));
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:2139:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        _efl_net_ip_connect_async_run_socks5(d, host, port, proxy + strlen("socks://"));
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:2141:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          _efl_net_ip_connect_async_run_socks4(d, host, port, proxy + strlen("socks://"));
data/efl-1.25.1/src/lib/ecore_con/ecore_con.c:2361:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memmove(endptr, endptr + 1, strlen(endptr + 1) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet.c:554:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   protocol_length = strlen(protocol_name) + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con_eet.c:556:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   section_length = strlen(section) + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con_proxy_helper.c:106:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         req->str, strlen(req->str));
data/efl-1.25.1/src/lib/ecore_con/ecore_con_proxy_helper.c:315:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     ecore_exe_send(_efl_net_proxy_helper_exe, str, strlen(str));
data/efl-1.25.1/src/lib/ecore_con/ecore_con_proxy_helper.c:349:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   buf = alloca(strlen(url) + 256);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:131:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((!socks) || (!socks[0]) || (strlen(socks) + 1 > 512)) return;
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:132:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memcpy(buf, socks, strlen(socks) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:185:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ulen = strlen(username);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:209:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return !!_ecore_con_socks_find(4, ip, port, username, username ? strlen(username) : 0, NULL, 0);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:220:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   v4 = (Ecore_Con_Socks_v4 *)_ecore_con_socks_find(4, ip, port, username, username ? strlen(username) : 0, NULL, 0);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:236:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ulen = strlen(username);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:242:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        plen = strlen(password);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:268:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return !!_ecore_con_socks_find(5, ip, port, username, username ? strlen(username) : 0, password, password ? strlen(password) : 0);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:268:112:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return !!_ecore_con_socks_find(5, ip, port, username, username ? strlen(username) : 0, password, password ? strlen(password) : 0);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:280:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   v5 = (Ecore_Con_Socks_v5 *)_ecore_con_socks_find(5, ip, port, username, username ? strlen(username) : 0, password, password ? strlen(password) : 0);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_socks.c:280:130:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   v5 = (Ecore_Con_Socks_v5 *)_ecore_con_socks_find(5, ip, port, username, username ? strlen(username) : 0, password, password ? strlen(password) : 0);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:473:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(header->key) + strlen(header->value) + strlen(": \r\n") + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:473:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(header->key) + strlen(header->value) + strlen(": \r\n") + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:473:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(header->key) + strlen(header->value) + strlen(": \r\n") + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:483:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  str = malloc(strlen("\r\n") + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:485:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memcpy(str, "\r\n", strlen("\r\n") + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:489:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(header->value) + strlen("\r\n") + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:489:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(header->value) + strlen("\r\n") + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:497:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   str = malloc(strlen("\r\n") + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:499:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memcpy(str, "\r\n", strlen("\r\n") + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:570:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p += strlen("://");
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:979:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(key) + 1 +
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:980:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(value) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:984:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memcpy(s, key, strlen(key) + 1);
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:986:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   header->value = s = s + strlen(key) + 1;
data/efl-1.25.1/src/lib/ecore_con/ecore_con_url.c:987:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memcpy(s, value, strlen(value) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:624:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memset(str, 0, strlen(str));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:1018:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncmp(h->key, "HTTP/", strlen("HTTP/")) != 0)
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:1321:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define IS_HEADER(x) (strncasecmp(sl_it->data, x ":", strlen(x ":")) == 0)
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:1407:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             ctx->url = malloc(strlen("http://") + strlen(address) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:1407:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             ctx->url = malloc(strlen("http://") + strlen(address) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:1410:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memcpy(ctx->url, "http://", strlen("http://"));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:1411:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memcpy(ctx->url + strlen("http://"), address, strlen(address) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_http.c:1411:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memcpy(ctx->url + strlen("http://"), address, strlen(address) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_unix.c:155:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strncmp(address, "abstract:", strlen("abstract:")) == 0)
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_unix.c:157:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char *path = address + strlen("abstract:");
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_unix.c:158:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(path) + 2 > sizeof(addr.sun_path))
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_unix.c:164:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memcpy(addr.sun_path + 1, path, strlen(path) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_unix.c:165:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        addrlen = strlen(path) + 2 + offsetof(struct sockaddr_un, sun_path);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_unix.c:170:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(path) + 1 > sizeof(addr.sun_path))
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_unix.c:175:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memcpy(addr.sun_path, path, strlen(path) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_unix.c:176:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        addrlen = strlen(path) + 1 + offsetof(struct sockaddr_un, sun_path);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:898:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncasecmp(pd->address_dial, "ws://", strlen("ws://")) == 0)
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:900:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             tmp = malloc(strlen(str) + strlen("ws://") - strlen("http://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:900:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             tmp = malloc(strlen(str) + strlen("ws://") - strlen("http://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:900:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             tmp = malloc(strlen(str) + strlen("ws://") - strlen("http://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:903:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memcpy(tmp, "ws://", strlen("ws://"));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:904:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memcpy(tmp + strlen("ws://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:905:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         str + strlen("http://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:906:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         strlen(str) - strlen("http://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:906:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         strlen(str) - strlen("http://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:910:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (strncasecmp(pd->address_dial, "wss://", strlen("wss://")) == 0)
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:912:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             tmp = malloc(strlen(str) + strlen("wss://") - strlen("https://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:912:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             tmp = malloc(strlen(str) + strlen("wss://") - strlen("https://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:912:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             tmp = malloc(strlen(str) + strlen("wss://") - strlen("https://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:915:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memcpy(tmp, "wss://", strlen("wss://"));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:916:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  memcpy(tmp + strlen("wss://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:917:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         str + strlen("https://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:918:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         strlen(str) - strlen("https://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:918:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         strlen(str) - strlen("https://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1000:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (len) len += strlen(", ");
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1011:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             memcpy(protocols + offset, ", ", strlen(", "));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1012:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             offset += strlen(", ");
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1141:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strncasecmp(address, "ws://", strlen("ws://")) == 0) {
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1142:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tmp = malloc(strlen(address) + strlen("http://") - strlen("ws://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1142:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tmp = malloc(strlen(address) + strlen("http://") - strlen("ws://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1142:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tmp = malloc(strlen(address) + strlen("http://") - strlen("ws://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1144:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memcpy(tmp, "http://", strlen("http://"));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1145:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memcpy(tmp + strlen("http://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1146:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             address + strlen("ws://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1147:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(address) - strlen("ws://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1147:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(address) - strlen("ws://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1149:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   } else if (strncasecmp(address, "wss://", strlen("wss://")) == 0) {
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1150:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tmp = malloc(strlen(address) + strlen("https://") - strlen("wss://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1150:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tmp = malloc(strlen(address) + strlen("https://") - strlen("wss://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1150:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tmp = malloc(strlen(address) + strlen("https://") - strlen("wss://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1152:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memcpy(tmp, "https://", strlen("https://"));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1153:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memcpy(tmp + strlen("https://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1154:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             address + strlen("wss://"),
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1155:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(address) - strlen("wss://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1155:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(address) - strlen("wss://") + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1465:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(reason);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1481:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  text, strlen(text));
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1531:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(message);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_websocket.c:1570:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(key);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_windows.c:46:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   EINA_SAFETY_ON_TRUE_RETURN_VAL(strlen(PIPE_NS) + strlen(address) >= 256, EINVAL);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_windows.c:46:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   EINA_SAFETY_ON_TRUE_RETURN_VAL(strlen(PIPE_NS) + strlen(address) >= 256, EINVAL);
data/efl-1.25.1/src/lib/ecore_con/efl_net_dialer_windows.c:122:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return pd->address_dial + strlen(PIPE_NS);
data/efl-1.25.1/src/lib/ecore_con/efl_net_ip_address.c:346:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  size_t len = strlen(numeric_address);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:64:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   addrlen = strlen(address);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:69:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
   strncpy(lockfile + addrlen, ".lock", 6);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:115:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (strncmp(address, "abstract:", strlen("abstract:")) != 0))
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:144:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       (strncmp(address, "abstract:", strlen("abstract:")) != 0))
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:158:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncmp(address, "abstract:", strlen("abstract:")) == 0)
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:160:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             const char *path = address + strlen("abstract:");
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:161:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (strlen(path) + 2 > sizeof(addr.sun_path))
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:167:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             memcpy(addr.sun_path + 1, path, strlen(path) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:168:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             addrlen = strlen(path) + 2 + offsetof(struct sockaddr_un, sun_path);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:173:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (strlen(path) + 1 > sizeof(addr.sun_path))
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:178:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             memcpy(addr.sun_path, path, strlen(path) + 1);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_unix.c:179:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             addrlen = strlen(path) + 1 + offsetof(struct sockaddr_un, sun_path);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_windows.c:313:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return pd->address + strlen(PIPE_NS);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_windows.c:413:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   EINA_SAFETY_ON_TRUE_RETURN_VAL(strlen(PIPE_NS) + strlen(address) >= 256, EINVAL);
data/efl-1.25.1/src/lib/ecore_con/efl_net_server_windows.c:413:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   EINA_SAFETY_ON_TRUE_RETURN_VAL(strlen(PIPE_NS) + strlen(address) >= 256, EINVAL);
data/efl-1.25.1/src/lib/ecore_con/efl_net_socket_windows.c:93:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(str);
data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_conn-gnutls.c:355:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   r = gnutls_server_name_set(conn->session, GNUTLS_NAME_DNS, hostname, strlen(hostname));
data/efl-1.25.1/src/lib/ecore_con/efl_net_ssl_conn-openssl.c:143:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return efl_net_socket_bio_write(b, str, strlen(str));
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c:368:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e = calloc(1, sizeof(Ecore_Event_Key) + strlen(key) + strlen(keyname) +
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c:368:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e = calloc(1, sizeof(Ecore_Event_Key) + strlen(key) + strlen(keyname) +
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c:369:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              ((compose[0] != '\0') ? strlen(compose) : 0) + 3);
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c:373:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e->key = e->keyname + strlen(keyname) + 1;
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c:374:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e->compose = strlen(compose) ? e->key + strlen(key) + 1 : NULL;
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c:374:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e->compose = strlen(compose) ? e->key + strlen(key) + 1 : NULL;
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_evdev.c:379:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(compose)) strcpy((char *)e->compose, compose);
data/efl-1.25.1/src/lib/ecore_drm/ecore_drm_output.c:119:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(text, (const char *)data, 12);
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_fb.c:526:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(100);
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_fb.c:621:14:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
             usleep(100);
data/efl-1.25.1/src/lib/ecore_drm2/ecore_drm2_outputs.c:132:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(text, (const char *)data, 12);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:731:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int len = strlen(key);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:768:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int len = strlen(key);
data/efl-1.25.1/src/lib/ecore_evas/ecore_evas.c:2295:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp(supported_hint, hint, strlen(hint)))
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:113:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        e = calloc(1, sizeof(Ecore_Event_Key) + strlen(key) +
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:114:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(keyname) + (compose ? strlen(compose) : 0) + 3);
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:114:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(keyname) + (compose ? strlen(compose) : 0) + 3);
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:119:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        e->key = e->keyname + strlen(keyname) + 1;
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:120:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        e->compose = (compose) ? e->key + strlen(key) + 1 : NULL;
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_li.c:417:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   len = read(dev->fd, &ev, sizeof(ev));
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_ts.c:252:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        v = read(_ecore_fb_ts_fd, ptr, num);
data/efl-1.25.1/src/lib/ecore_fb/ecore_fb_vt.c:138:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
   usleep(40000);
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:58:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(file);
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:366:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((strlen(path) == 2) &&
data/efl-1.25.1/src/lib/ecore_file/ecore_file.c:600:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(buf, file, PATH_MAX);
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_inotify.c:143:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(path);
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_inotify.c:188:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   size = read(fd, buffer, sizeof(buffer));
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_inotify.c:220:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, em->path, sizeof(buf));
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_poll.c:88:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(path);
data/efl-1.25.1/src/lib/ecore_file/ecore_file_monitor_win32.c:262:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(path);
data/efl-1.25.1/src/lib/ecore_file/ecore_file_path.c:49:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   env_path = alloca(sizeof(char) * strlen(env_tmp) + 1);
data/efl-1.25.1/src/lib/ecore_file/ecore_file_path.c:50:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memset(env_path, 0, strlen(env_tmp));
data/efl-1.25.1/src/lib/ecore_input/ecore_input_compose.c:56:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(p);
data/efl-1.25.1/src/lib/ecore_input/ecore_input_compose.c:91:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(p);
data/efl-1.25.1/src/lib/ecore_input/ecore_input_joystick.c:413:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   len = read(fd, &event, sizeof(event));
data/efl-1.25.1/src/lib/ecore_input/ecore_input_joystick.c:460:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   dlen = strlen(dev);
data/efl-1.25.1/src/lib/ecore_input/ecore_input_joystick.c:461:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   plen = strlen(joystickPrefix);
data/efl-1.25.1/src/lib/ecore_input/ecore_input_joystick.c:642:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                strncpy(name, "Unknown", sizeof(name));
data/efl-1.25.1/src/lib/ecore_ipc/Ecore_Ipc.h:134:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ptr += strlen(p->v) + 1; \
data/efl-1.25.1/src/lib/ecore_ipc/Ecore_Ipc.h:144:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define ECORE_IPC_SLEN(l, v) ((l = strlen(p->v)) + 1)
data/efl-1.25.1/src/lib/ecore_ipc/Ecore_Ipc.h:145:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define ECORE_IPC_CNTS(v)   len += strlen(p->v) + 1
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:499:20:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        old_mask = umask(new_mask);
data/efl-1.25.1/src/lib/ecore_ipc/ecore_ipc.c:510:6:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
     umask(old_mask);
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_dnd.c:697:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   len = read(read_source->read_fd, buffer, sizeof buffer);
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:835:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e = calloc(1, sizeof(Ecore_Event_Key) + strlen(key) + strlen(keyname) +
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:835:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e = calloc(1, sizeof(Ecore_Event_Key) + strlen(key) + strlen(keyname) +
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:836:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              ((compose[0] != '\0') ? strlen(compose) : 0) + 3);
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:840:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e->key = e->keyname + strlen(keyname) + 1;
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:841:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e->compose = strlen(compose) ? e->key + strlen(key) + 1 : NULL;
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:841:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e->compose = strlen(compose) ? e->key + strlen(key) + 1 : NULL;
data/efl-1.25.1/src/lib/ecore_wayland/ecore_wl_input.c:846:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(compose)) strcpy((char *)e->compose, compose);
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_clipboard.c:99:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size16 = (wcslen(text16) + 1) * sizeof(wchar_t);
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_clipboard.c:189:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       *size = strlen(data);
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_clipboard.c:206:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  *size = strlen(d) + 1;
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_dnd.c:133:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size = strlen(data) + 1;
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:1364:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen(keyname) + 1 +
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:1365:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen(key) + 1 +
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:1366:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 (compose ? strlen(compose) : 0) + 1);
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:1371:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e->key = e->keyname + strlen(keyname) + 1;
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:1374:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     e->compose = (e->key + strlen(key) + 1);
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:1377:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memcpy((char *)e->keyname, keyname, strlen(keyname));
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:1378:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memcpy((char *)e->key, key, strlen(key));
data/efl-1.25.1/src/lib/ecore_win32/ecore_win32_event.c:1381:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memcpy((char *)e->compose, compose, strlen(compose));
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_display.c:125:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p += strlen(p) + 1;
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_display.c:213:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             p += strlen(p) + 1;
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_dnd.c:800:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     len = read(fd, buffer, sizeof(buffer));
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:626:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   name_len = strlen(keyname);
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:627:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   key_len = strlen(key);
data/efl-1.25.1/src/lib/ecore_wl2/ecore_wl2_input.c:628:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   comp_len = strlen(compose);
data/efl-1.25.1/src/lib/ecore_x/ecore_x.c:216:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       char *tsym = alloca(strlen(fname) + 1);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_dnd.c:122:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int bufsize = strlen((char *)text_prop.value) + 1;
data/efl-1.25.1/src/lib/ecore_x/ecore_x_events.c:395:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   key_len = strlen(key);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_events.c:396:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   keyname_len = strlen(keyname);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_events.c:397:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   compose_len = (compose) ? strlen(compose) : 0;
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:205:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(s) + 1;
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:1685:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(info->buffer) != 20)
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:1724:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(p) != 20)
data/efl-1.25.1/src/lib/ecore_x/ecore_x_netwm.c:1741:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   PropModeReplace, (unsigned char *)str, strlen(str));
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:738:31:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                              strncpy(ret[i]->name, res->modes[i].name,
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:869:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                    strncpy(ret->name, res->modes[i].name,
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:2210:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  s = strlen(info->name);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:3532:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                  strncpy(name, edid_name, 13);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:3569:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                  strncpy(ascii, edid_ascii, 13);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_randr.c:3605:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                  strncpy(serial, edid_serial, 13);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_selection.c:602:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int bufsize = strlen((char *)text_prop.value);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_selection.c:617:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int bufsize = strlen(text_prop.value);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_selection.c:929:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sz = strlen(buf);
data/efl-1.25.1/src/lib/ecore_x/ecore_x_window_prop.c:662:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   xtp.nitems = strlen(str);
data/efl-1.25.1/src/lib/edje/edje_cache.c:21:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buffer = alloca(strlen(ce->entry) + strlen(#Tp) + 2); \
data/efl-1.25.1/src/lib/edje/edje_cache.c:21:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buffer = alloca(strlen(ce->entry) + strlen(#Tp) + 2); \
data/efl-1.25.1/src/lib/edje/edje_cache.c:418:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   crc = eina_crc(filename, strlen(filename), 0xffffffff, EINA_TRUE);
data/efl-1.25.1/src/lib/edje/edje_calc.c:1662:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  size_t len = strlen(font) + sizeof("edje/fonts/") + 1;
data/efl-1.25.1/src/lib/edje/edje_calc.c:1681:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             font2 = malloc(strlen(font) + 1 + strlen(_edje_fontset_append) + 1);
data/efl-1.25.1/src/lib/edje/edje_calc.c:1681:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             font2 = malloc(strlen(font) + 1 + strlen(_edje_fontset_append) + 1);
data/efl-1.25.1/src/lib/edje/edje_calc.c:1685:19:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                  strcat(font2, ",");
data/efl-1.25.1/src/lib/edje/edje_calc.c:2571:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 len += strlen(data->name);
data/efl-1.25.1/src/lib/edje/edje_calc.c:4049:14:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
             strncat(depends_path, ep->part->name,
data/efl-1.25.1/src/lib/edje/edje_calc.c:4050:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     sizeof(depends_path) - strlen(depends_path) - 1);
data/efl-1.25.1/src/lib/edje/edje_calc.c:4053:19:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
                  strncat(depends_path, " -> ",
data/efl-1.25.1/src/lib/edje/edje_calc.c:4054:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          sizeof(depends_path) - strlen(depends_path) - 1);
data/efl-1.25.1/src/lib/edje/edje_calc.c:4055:19:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
                  strncat(depends_path, part_name,
data/efl-1.25.1/src/lib/edje/edje_calc.c:4056:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          sizeof(depends_path) - strlen(depends_path) - 1);
data/efl-1.25.1/src/lib/edje/edje_convert.c:194:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          length = strlen(fnt->entry) + 7;
data/efl-1.25.1/src/lib/edje/edje_edit.c:206:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int len = strlen("edje/scripts/embryo/source/");
data/efl-1.25.1/src/lib/edje/edje_edit.c:12227:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return strlen(name) + 1;
data/efl-1.25.1/src/lib/edje/edje_edit.c:12250:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   codesize = strlen(code);
data/efl-1.25.1/src/lib/edje/edje_edit.c:12937:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             data_len = strlen(str);
data/efl-1.25.1/src/lib/edje/edje_edit.c:13155:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             data_len = strlen(str);
data/efl-1.25.1/src/lib/edje/edje_edit.c:13312:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = 0, len = strlen(VAL); i < len; i++) \
data/efl-1.25.1/src/lib/edje/edje_edit.c:13743:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int indent_space = strlen(I6);
data/efl-1.25.1/src/lib/edje/edje_edit.c:13815:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   indent_space = strlen(I6);
data/efl-1.25.1/src/lib/edje/edje_edit.c:13829:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             char relative_str[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:13830:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             snprintf(relative_str, strlen("relative") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:13935:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   indent_space = strlen(I6);
data/efl-1.25.1/src/lib/edje/edje_edit.c:13948:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             char relative_str[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:13949:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             snprintf(relative_str, strlen("relative") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:13995:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int indent_space = strlen(I6);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14095:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char border_scale_by_str[strlen("border_scale_by") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14096:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        snprintf(border_scale_by_str, strlen("border_scale_by") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:14172:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     indent_space = strlen(I6);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14191:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             indent_space = strlen(I7);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14199:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               char relative[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14200:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               snprintf(relative, strlen("relative") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:14220:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             indent_space = strlen(I7);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14229:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               char relative[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14230:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               snprintf(relative, strlen("relative") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:14315:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     indent_space = strlen(I6);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14364:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 indent_space = strlen(I7);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14379:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 char rot_x[strlen("x") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14380:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 snprintf(rot_x, strlen("x") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:14388:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 char rot_y[strlen("y") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14389:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 snprintf(rot_y, strlen("y") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:14397:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 char rot_z[strlen("z") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14398:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 snprintf(rot_z, strlen("z") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:14449:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     indent_space = strlen(I6);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14515:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     indent_space = strlen(I6);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14534:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             indent_space = strlen(I7);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14542:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               char relative[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14543:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               snprintf(relative, strlen("relative") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:14563:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             indent_space = strlen(I7);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14572:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               char relative[strlen("relative") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14573:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               snprintf(relative, strlen("relative") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:14637:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     indent_space = strlen(I6);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14663:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             char align_str[strlen("align") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14664:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             snprintf(align_str, strlen("align") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:14736:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     indent_space = strlen(I6);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14757:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             char align_str[strlen("align") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14758:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             snprintf(align_str, strlen("align") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:14894:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     indent_space = strlen(I6);
data/efl-1.25.1/src/lib/edje/edje_edit.c:14947:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char align_str[strlen("align") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14948:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        snprintf(align_str, strlen("align") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:14964:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char ellipsis_str[strlen("ellipsis") + indent_space + 1];
data/efl-1.25.1/src/lib/edje/edje_edit.c:14965:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        snprintf(ellipsis_str, strlen("ellipsis") + indent_space + 1,
data/efl-1.25.1/src/lib/edje/edje_edit.c:15764:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(state, data, sizeof(state) - 1); /* if we go over it, too bad.. the list of states may need to change to provide name and value separated */
data/efl-1.25.1/src/lib/edje/edje_edit.c:16518:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(eed->embryo_source) + 1, 1);
data/efl-1.25.1/src/lib/edje/edje_edit.c:16529:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  eet_write(eetf, buf, ps->code, strlen(ps->code) + 1, 1);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:305:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((int)strlen(s) < params[3])
data/efl-1.25.1/src/lib/edje/edje_embryo.c:313:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             ss = alloca(strlen(s) + 1);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:338:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strlen(s);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:527:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((int)strlen(s) < params[4])
data/efl-1.25.1/src/lib/edje/edje_embryo.c:535:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             ss = alloca(strlen(s) + 1);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:1229:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if ((int)strlen(s) < params[3])
data/efl-1.25.1/src/lib/edje/edje_embryo.c:1237:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  ss = alloca(strlen(s) + 1);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:1559:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((int)strlen(s) < params[3])
data/efl-1.25.1/src/lib/edje/edje_embryo.c:1567:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             ss = alloca(strlen(s) + 1);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:3988:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return strlen(eep.s);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:4019:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   src_len = strlen(eep.s);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:4089:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return strlen(eep.s);
data/efl-1.25.1/src/lib/edje/edje_embryo.c:4120:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   src_len = strlen(eep.s);
data/efl-1.25.1/src/lib/edje/edje_entry.c:378:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size = strlen(s);
data/efl-1.25.1/src/lib/edje/edje_entry.c:398:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size = strlen(s);
data/efl-1.25.1/src/lib/edje/edje_entry.c:411:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size = strlen(s);
data/efl-1.25.1/src/lib/edje/edje_entry.c:841:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = 200 + strlen(n);
data/efl-1.25.1/src/lib/edje/edje_entry.c:881:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = 200 + strlen(n);
data/efl-1.25.1/src/lib/edje/edje_entry.c:945:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = 200 + strlen(n);
data/efl-1.25.1/src/lib/edje/edje_entry.c:973:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = 200 + strlen(n);
data/efl-1.25.1/src/lib/edje/edje_entry.c:1001:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = 200 + strlen(n);
data/efl-1.25.1/src/lib/edje/edje_entry.c:1433:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else len = strlen(start);
data/efl-1.25.1/src/lib/edje/edje_entry.c:1441:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(tmp, start, len);
data/efl-1.25.1/src/lib/edje/edje_entry.c:4946:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(preedit_string) > 0)
data/efl-1.25.1/src/lib/edje/edje_legacy.c:707:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             int len_added = strlen(text);
data/efl-1.25.1/src/lib/edje/edje_legacy.c:708:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             int len_old = strlen(rp->typedata.text->text);
data/efl-1.25.1/src/lib/edje/edje_legacy.c:847:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   text_len = strlen(text);
data/efl-1.25.1/src/lib/edje/edje_legacy.c:881:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   text_len = strlen(text);
data/efl-1.25.1/src/lib/edje/edje_legacy.c:916:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               len = strlen(str);
data/efl-1.25.1/src/lib/edje/edje_load.c:2539:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   *length = strlen(src);
data/efl-1.25.1/src/lib/edje/edje_load.c:2607:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             length_index = strlen(name) + 2;
data/efl-1.25.1/src/lib/edje/edje_load.c:2613:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     length_parent = strlen(ed->parent);
data/efl-1.25.1/src/lib/edje/edje_load.c:2614:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length_source = strlen(source);
data/efl-1.25.1/src/lib/edje/edje_load.c:2650:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             origin = strlen(new_src);
data/efl-1.25.1/src/lib/edje/edje_load.c:2657:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  alias_length = strlen(alias);
data/efl-1.25.1/src/lib/edje/edje_lua2.c:2869:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            memcpy(buf, IMAGES, strlen(IMAGES));
data/efl-1.25.1/src/lib/edje/edje_lua2.c:2870:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            eina_convert_itoa(id, buf + strlen(IMAGES)); /* No need to check length as 2³² need only 10 characters. */
data/efl-1.25.1/src/lib/edje/edje_lua2.c:3695:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  size_t len = strlen(font) + sizeof("edje/fonts/") + 1;
data/efl-1.25.1/src/lib/edje/edje_private.h:2716:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((int) strlen((s)) < params[4]) {	\
data/efl-1.25.1/src/lib/edje/edje_private.h:2720:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   ss = alloca(strlen((s)) + 1);	\
data/efl-1.25.1/src/lib/edje/edje_private.h:2868:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(str);
data/efl-1.25.1/src/lib/edje/edje_program.c:28:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   alien = strlen(alias);
data/efl-1.25.1/src/lib/edje/edje_program.c:29:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   nslen = strlen(sig);
data/efl-1.25.1/src/lib/edje/edje_program.c:1555:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l1 = strlen(sig);
data/efl-1.25.1/src/lib/edje/edje_program.c:1556:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l2 = strlen(src);
data/efl-1.25.1/src/lib/edje/edje_smart.c:265:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(limit_name) + 13;
data/efl-1.25.1/src/lib/edje/edje_text.c:170:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   font_len = strlen(new);
data/efl-1.25.1/src/lib/edje/edje_text.c:172:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   style_len = (aux) ? (size_t)(aux - base_style) : strlen(base_style);
data/efl-1.25.1/src/lib/edje/edje_text.c:278:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size_t len = strlen(font) + sizeof("edje/fonts/") + 1;
data/efl-1.25.1/src/lib/edje/edje_text.c:289:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        font2 = malloc(strlen(font) + 1 + strlen(_edje_fontset_append) + 1);
data/efl-1.25.1/src/lib/edje/edje_text.c:289:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        font2 = malloc(strlen(font) + 1 + strlen(_edje_fontset_append) + 1);
data/efl-1.25.1/src/lib/edje/edje_text.c:293:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
             strcat(font2, ",");
data/efl-1.25.1/src/lib/edje/edje_textblock.c:502:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t len = strlen(violate);
data/efl-1.25.1/src/lib/edje/edje_util.c:298:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = lookup ? (size_t)(lookup - locale) : strlen(locale);
data/efl-1.25.1/src/lib/edje/edje_util.c:331:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = lookup ? lookup - locale : (int)strlen(locale);
data/efl-1.25.1/src/lib/edje/edje_util.c:3446:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   name_len = strlen(name) + 1;
data/efl-1.25.1/src/lib/edje/edje_util.c:5471:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            tmp = alloca(strlen(rp->part->name) + 2);
data/efl-1.25.1/src/lib/edje/edje_util.c:5689:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   alias_length = strlen(alias);
data/efl-1.25.1/src/lib/edje/edje_util.c:5692:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     length += strlen(path[i]) + 1;
data/efl-1.25.1/src/lib/eet/eet_cipher.c:325:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             for (j = 0; strlen(res) > j; j += 32)
data/efl-1.25.1/src/lib/eet/eet_data.c:829:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return strlen(s) + 1;
data/efl-1.25.1/src/lib/eet/eet_data.c:860:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(s);
data/efl-1.25.1/src/lib/eet/eet_data.c:1021:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/efl-1.25.1/src/lib/eet/eet_data.c:1098:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/efl-1.25.1/src/lib/eet/eet_data.c:1167:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/efl-1.25.1/src/lib/eet/eet_data.c:1598:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   chnk->len = strlen(name) + 1;
data/efl-1.25.1/src/lib/eet/eet_data.c:4885:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         strlen(cipher_key), &ret, &ret_len))
data/efl-1.25.1/src/lib/eet/eet_data.c:4936:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(cipher_key), &ciphered, &ciphered_len))
data/efl-1.25.1/src/lib/eet/eet_data.c:5013:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(cipher_key), &deciphered, &deciphered_len))
data/efl-1.25.1/src/lib/eet/eet_data.c:5056:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(cipher_key), &deciphered, &deciphered_len))
data/efl-1.25.1/src/lib/eet/eet_data.c:5180:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(cipher_key), &ciphered, &ciphered_len))
data/efl-1.25.1/src/lib/eet/eet_data.c:5221:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(cipher_key), &ciphered, &ciphered_len))
data/efl-1.25.1/src/lib/eet/eet_dictionary.c:104:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(string) + 1;
data/efl-1.25.1/src/lib/eet/eet_image.c:1608:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if(!eet_cipher(d, size, cipher_key, strlen(cipher_key), &ciphered_d,
data/efl-1.25.1/src/lib/eet/eet_image.c:1689:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!eet_decipher(data, size, cipher_key, strlen(cipher_key),
data/efl-1.25.1/src/lib/eet/eet_image.c:2087:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!eet_decipher(data, size, cipher_key, strlen(cipher_key),
data/efl-1.25.1/src/lib/eet/eet_image.c:2177:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!eet_decipher(data, size, cipher_key, strlen(cipher_key),
data/efl-1.25.1/src/lib/eet/eet_lib.c:357:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             bytes_strings += strlen(efn->name) + 1;
data/efl-1.25.1/src/lib/eet/eet_lib.c:1181:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(efn->name, (char *)p + HEADER_SIZE, name_size);
data/efl-1.25.1/src/lib/eet/eet_lib.c:1600:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   file_len = strlen(file) + 1;
data/efl-1.25.1/src/lib/eet/eet_lib.c:1778:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                  strncpy(str, buf, end - buf);
data/efl-1.25.1/src/lib/eet/eet_lib.c:1953:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    cipher_key, strlen(cipher_key));
data/efl-1.25.1/src/lib/eet/eet_lib.c:2278:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   in = eina_binbuf_manage_new((unsigned char*) destination, strlen(destination) + 1, EINA_TRUE);
data/efl-1.25.1/src/lib/eet/eet_lib.c:2301:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              eet_define_data(ef, efn, in, strlen(destination) + 1, comp, 0);
data/efl-1.25.1/src/lib/eet/eet_lib.c:2316:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        efn->name_size = strlen(efn->name) + 1;
data/efl-1.25.1/src/lib/eet/eet_lib.c:2324:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        eet_define_data(ef, efn, in, strlen(destination) + 1, comp, 0);
data/efl-1.25.1/src/lib/eet/eet_lib.c:2435:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  cipher_key, strlen(cipher_key));
data/efl-1.25.1/src/lib/eet/eet_lib.c:2466:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        efn->name_size = strlen(efn->name) + 1;
data/efl-1.25.1/src/lib/eeze/eeze_sensor.c:216:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (!module->read)
data/efl-1.25.1/src/lib/eeze/eeze_sensor.c:229:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (module->read(sens))
data/efl-1.25.1/src/lib/eeze/eeze_sensor.c:309:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (module->read)
data/efl-1.25.1/src/lib/eeze/eeze_sensor.c:310:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     return module->read(sens);
data/efl-1.25.1/src/lib/eeze/eeze_sensor_private.h:60:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   Eina_Bool (*read)(Eeze_Sensor_Obj *obj); /**< Pointer to module read function */
data/efl-1.25.1/src/lib/efl/interfaces/efl_gfx_color.c:87:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (size_t) strlen(colorcode);
data/efl-1.25.1/src/lib/efl/interfaces/efl_gfx_color.c:109:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = (size_t) strlen(colorcode);
data/efl-1.25.1/src/lib/efl/interfaces/efl_gfx_path.c:1519:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pd->path_data = malloc(strlen(svg_path_data) + 1);
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:1063:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        len = read(fd, buf, sizeof(buf));
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:3751:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   s->kbd.keymap_str_size = strlen(s->kbd.keymap_str) + 1;
data/efl-1.25.1/src/lib/efl_canvas_wl/efl_canvas_wl.c:5847:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     s->kbd.keymap_str_size = strlen(str) + 1;
data/efl-1.25.1/src/lib/efreet/efreet.c:315:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(p) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_base.c:313:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t len = strlen(dir);
data/efl-1.25.1/src/lib/efreet/efreet_base.c:382:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(user) + strlen(fallback) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_base.c:382:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(user) + strlen(fallback) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_base.c:425:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(s);
data/efl-1.25.1/src/lib/efreet/efreet_base.c:458:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    env = alloca(strlen(in) + 1);
data/efl-1.25.1/src/lib/efreet/efreet_base.c:558:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret = alloca(strlen(home) + strlen(fallback) + 2);
data/efl-1.25.1/src/lib/efreet/efreet_base.c:558:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret = alloca(strlen(home) + strlen(fallback) + 2);
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:156:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(try_gap);
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:186:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (s) len = strlen(s);
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:229:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (s) len = strlen(s);
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:371:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (s) len = strlen(s);
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:1329:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ecore_ipc_server_send(ipc, 2, 0, 0, 0, 0, path, strlen(path));
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:1348:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        eina_binbuf_append_length(buf, (unsigned char *)s, strlen(s));
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:1372:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        eina_binbuf_append_length(buf, (unsigned char *)s, strlen(s));
data/efl-1.25.1/src/lib/efreet/efreet_cache.c:1425:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (s) len = strlen(s);
data/efl-1.25.1/src/lib/efreet/efreet_desktop.c:596:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(string) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_desktop.c:637:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(elem);
data/efl-1.25.1/src/lib/efreet/efreet_desktop.c:653:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(string + pos, ";");
data/efl-1.25.1/src/lib/efreet/efreet_desktop.c:782:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(val);
data/efl-1.25.1/src/lib/efreet/efreet_desktop.c:789:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(tmpval, val + 1, len - 2);
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:720:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(uri);
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:724:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path = uri + strlen("file:");
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:728:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path = uri + strlen("file:");
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:737:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len2 = strlen(uri + 7) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:745:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                path = uri + strlen("file://localhost");
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:752:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    path = uri + strlen("file://") + strlen(hostname);
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:752:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    path = uri + strlen("file://") + strlen(hostname);
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:759:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path = uri + strlen("file://");
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:844:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/efl-1.25.1/src/lib/efreet/efreet_desktop_command.c:864:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int append_len = strlen(src);
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:106:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(user) + strlen("/.icons") + 1;
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:106:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(user) + strlen("/.icons") + 1;
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:127:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(user) + strlen("/icons") + 1;
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:127:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(user) + strlen("/icons") + 1;
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:459:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(tmp) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:494:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(tmp) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:715:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(path);
data/efl-1.25.1/src/lib/efreet/efreet_icon.c:811:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(path);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:370:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str) - 1;
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:419:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    maxlen += strlen(key);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:420:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (lang) maxlen += strlen(lang);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:421:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (country) maxlen += strlen(country);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:422:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (modifier) maxlen += strlen(modifier);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:475:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    maxlen += strlen(key);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:476:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (lang) maxlen += strlen(lang);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:477:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (country) maxlen += strlen(country);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:478:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (modifier) maxlen += strlen(modifier);
data/efl-1.25.1/src/lib/efreet/efreet_ini.c:518:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf = alloca(strlen(str) + 1);
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:739:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(indent) + 3;
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:1537:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(efreet_menu_prefix);
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:1554:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len2 = strlen(parent->file.name) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:2889:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(move->new_name) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:2946:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(name) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:3141:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(path);
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:3192:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(buf2, fname, PATH_MAX);
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:3303:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(buf2, fname, PATH_MAX);
data/efl-1.25.1/src/lib/efreet/efreet_menu.c:3778:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(path) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:577:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sl = alloca(strlen(ext) + 1);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:597:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ext = alloca(strlen(file) + 1);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:765:16:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
               strncpy(path, file, PATH_MAX);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:768:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               path_len = strlen(file);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:769:16:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
               strncpy(parent, path, PATH_MAX);
data/efl-1.25.1/src/lib/efreet/efreet_mime.c:1263:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   tglob = alloca(strlen(glob) + 1);
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:115:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, file, PATH_MAX);
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:119:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        while (strlen(buf) > 1)
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:121:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(path, buf, PATH_MAX);
data/efl-1.25.1/src/lib/efreet/efreet_trash.c:129:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                    strncpy(buf, dir, PATH_MAX);
data/efl-1.25.1/src/lib/efreet/efreet_uri.c:102:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    snprintf(dest, strlen(uri->protocol) + 4, "%s://", uri->protocol);
data/efl-1.25.1/src/lib/efreet/efreet_uri.c:105:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = strlen(uri->protocol) + 3, p = uri->path; *p != '\0'; p++, i++)
data/efl-1.25.1/src/lib/efreet/efreet_utils.c:89:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp(path, dir, strlen(dir)))
data/efl-1.25.1/src/lib/efreet/efreet_utils.c:114:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(base);
data/efl-1.25.1/src/lib/efreet/efreet_utils.c:115:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(path) <= len)
data/efl-1.25.1/src/lib/efreet/efreet_utils.c:126:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len2 = strlen(path + len + 1) + 1;
data/efl-1.25.1/src/lib/efreet/efreet_utils.c:308:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             if (strlen(f1) < strlen(f2))
data/efl-1.25.1/src/lib/efreet/efreet_utils.c:308:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             if (strlen(f1) < strlen(f2))
data/efl-1.25.1/src/lib/efreet/efreet_xml.c:576:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if ((int)strlen(tag) > *size)
data/efl-1.25.1/src/lib/eina/eina_benchmark.c:227:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(EINA_BENCHMARK_FILENAME_MASK) + strlen(bench->name) + strlen(
data/efl-1.25.1/src/lib/eina/eina_benchmark.c:227:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(EINA_BENCHMARK_FILENAME_MASK) + strlen(bench->name) + strlen(
data/efl-1.25.1/src/lib/eina/eina_benchmark.c:227:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(EINA_BENCHMARK_FILENAME_MASK) + strlen(bench->name) + strlen(
data/efl-1.25.1/src/lib/eina/eina_benchmark.c:290:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tmp = strlen(EINA_BENCHMARK_DATA_MASK) + strlen(bench->name) + strlen(
data/efl-1.25.1/src/lib/eina/eina_benchmark.c:290:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tmp = strlen(EINA_BENCHMARK_DATA_MASK) + strlen(bench->name) + strlen(
data/efl-1.25.1/src/lib/eina/eina_benchmark.c:290:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tmp = strlen(EINA_BENCHMARK_DATA_MASK) + strlen(bench->name) + strlen(
data/efl-1.25.1/src/lib/eina/eina_benchmark.c:291:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            bench->run) + strlen(run->name);
data/efl-1.25.1/src/lib/eina/eina_counter.c:91:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             *position += strlen(result + *position);
data/efl-1.25.1/src/lib/eina/eina_counter.c:124:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(name) + 1;
data/efl-1.25.1/src/lib/eina/eina_debug.c:192:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int size = 8 + (app_name ? strlen(app_name) : 0) + 1;
data/efl-1.25.1/src/lib/eina/eina_debug.c:200:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memcpy(buf + 8, app_name, strlen(app_name) + 1);
data/efl-1.25.1/src/lib/eina/eina_debug.c:213:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   rret = read(session->fd, &size, 4);
data/efl-1.25.1/src/lib/eina/eina_debug.c:233:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  rret = read(session->fd, packet_buf + cur_packet_size, size - cur_packet_size);
data/efl-1.25.1/src/lib/eina/eina_debug.c:383:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size += strlen(info->ops[count].opcode_name) + 1;
data/efl-1.25.1/src/lib/eina/eina_debug.c:398:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = strlen(info->ops[count].opcode_name) + 1;
data/efl-1.25.1/src/lib/eina/eina_debug.c:448:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   (strlen((s)->sun_path) + (size_t)(((struct sockaddr_un *)NULL)->sun_path))
data/efl-1.25.1/src/lib/eina/eina_debug.c:523:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(socket_unix.sun_path, buf, sizeof(socket_unix.sun_path));
data/efl-1.25.1/src/lib/eina/eina_debug_chunk.c:262:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int len = strlen(str);
data/efl-1.25.1/src/lib/eina/eina_debug_cpu.c:212:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  red = read(fd, buf, sizeof(buf) - 1);
data/efl-1.25.1/src/lib/eina/eina_debug_cpu.c:237:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(1000); // 1ms sleep
data/efl-1.25.1/src/lib/eina/eina_debug_cpu.c:282:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(1000);
data/efl-1.25.1/src/lib/eina/eina_debug_timer.c:124:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
             if (read(pipeToThread[0], &c, 1) != 1) break;
data/efl-1.25.1/src/lib/eina/eina_evlog.c:164:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   event_size          = strlen(event) + 1;
data/efl-1.25.1/src/lib/eina/eina_evlog.c:170:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size          += strlen(detail) + 1;
data/efl-1.25.1/src/lib/eina/eina_file.c:157:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(dp->d_name);
data/efl-1.25.1/src/lib/eina/eina_file.c:212:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length = strlen(dp->d_name);
data/efl-1.25.1/src/lib/eina/eina_file.c:540:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(cwd) + 2;
data/efl-1.25.1/src/lib/eina/eina_file.c:640:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(dir);
data/efl-1.25.1/src/lib/eina/eina_file.c:688:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(dir);
data/efl-1.25.1/src/lib/eina/eina_file.c:748:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(dir);
data/efl-1.25.1/src/lib/eina/eina_file_common.c:417:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(path);
data/efl-1.25.1/src/lib/eina/eina_file_common.c:448:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   slen = virtual_name ? strlen(virtual_name) + 1 : strlen(tmpname) + 17;
data/efl-1.25.1/src/lib/eina/eina_file_common.c:448:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   slen = virtual_name ? strlen(virtual_name) + 1 : strlen(tmpname) + 17;
data/efl-1.25.1/src/lib/eina/eina_file_common.c:763:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ssize_t r = read(fd, buf, bufsize);
data/efl-1.25.1/src/lib/eina/eina_file_common.c:1032:16:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
   old_umask = umask(S_IRWXG|S_IRWXO);
data/efl-1.25.1/src/lib/eina/eina_file_common.c:1042:4:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
   umask(old_umask);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:121:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t l = strlen(dir);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:126:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   l = strlen(dir);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:211:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(cname);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:288:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     length = wcslen(old_name);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:290:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     length = strlen(old_name);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:494:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             path = alloca(strlen(dir) + strlen(filename) + 2);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:494:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             path = alloca(strlen(dir) + strlen(filename) + 2);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:496:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
             strcat(path, "/");
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:562:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(dir);
data/efl-1.25.1/src/lib/eina/eina_file_win32.c:604:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(dir);
data/efl-1.25.1/src/lib/eina/eina_hash.c:502:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return (int)strlen(key) + 1;
data/efl-1.25.1/src/lib/eina/eina_log.c:1057:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        name_len = strlen(name);
data/efl-1.25.1/src/lib/eina/eina_log.c:1058:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        color_len = strlen(color);
data/efl-1.25.1/src/lib/eina/eina_log.c:1061:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  (color_len + name_len + strlen(EINA_COLOR_RESET) + 1));
data/efl-1.25.1/src/lib/eina/eina_log.c:1068:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(EINA_COLOR_RESET));
data/efl-1.25.1/src/lib/eina/eina_log.c:1069:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ((char *)d)[color_len + name_len + strlen(EINA_COLOR_RESET)] = '\0';
data/efl-1.25.1/src/lib/eina/eina_log.c:1098:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   d->namelen = strlen(name);
data/efl-1.25.1/src/lib/eina/eina_log.c:1309:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(term);
data/efl-1.25.1/src/lib/eina/eina_log.c:1926:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   namelen = strlen(domain_name);
data/efl-1.25.1/src/lib/eina/eina_log.c:1976:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   namelen = strlen(domain_name);
data/efl-1.25.1/src/lib/eina/eina_module.c:122:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(name);
data/efl-1.25.1/src/lib/eina/eina_module.c:132:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length = strlen(path) + strlen(name) + 2;
data/efl-1.25.1/src/lib/eina/eina_module.c:132:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length = strlen(path) + strlen(name) + 2;
data/efl-1.25.1/src/lib/eina/eina_module.c:156:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(path) + 1 + strlen(name) + 1 +
data/efl-1.25.1/src/lib/eina/eina_module.c:156:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(path) + 1 + strlen(name) + 1 +
data/efl-1.25.1/src/lib/eina/eina_module.c:157:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strlen((char *)(cb_data->data)) + 1 + sizeof("module") +
data/efl-1.25.1/src/lib/eina/eina_module.c:261:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(file);
data/efl-1.25.1/src/lib/eina/eina_module.c:420:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             l0 = strlen(eina_dl.dli_fname);
data/efl-1.25.1/src/lib/eina/eina_module.c:421:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             l1 = strlen(pos);
data/efl-1.25.1/src/lib/eina/eina_module.c:423:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                l2 = strlen(sub_dir);
data/efl-1.25.1/src/lib/eina/eina_module.c:461:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l1 = strlen(env_dir);
data/efl-1.25.1/src/lib/eina/eina_module.c:463:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           l2 = strlen(sub_dir);
data/efl-1.25.1/src/lib/eina/eina_module.c:538:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(eina_module_file_get(m));
data/efl-1.25.1/src/lib/eina/eina_module.c:542:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(file_m);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:136:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        complen = strlen(comp);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:235:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:241:13:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
        if (sscanf(buf, "%lx-%lx %4s", &ptr1, &ptr2, mode) == 3)
data/efl-1.25.1/src/lib/eina/eina_prefix.c:304:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size_t len = strlen(buf2) + 1 + strlen(argv0) + 1;
data/efl-1.25.1/src/lib/eina/eina_prefix.c:304:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size_t len = strlen(buf2) + 1 + strlen(argv0) + 1;
data/efl-1.25.1/src/lib/eina/eina_prefix.c:338:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   lenexe = strlen(argv0);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:348:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf2, cp, len);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:391:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(prefix) + 1 + strlen(dir) + 1;
data/efl-1.25.1/src/lib/eina/eina_prefix.c:391:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(prefix) + 1 + strlen(dir) + 1;
data/efl-1.25.1/src/lib/eina/eina_prefix.c:504:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             _path_sep_fix(buf + strlen(datadir) + strlen(EINA_PATH_SEP_S));
data/efl-1.25.1/src/lib/eina/eina_prefix.c:504:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             _path_sep_fix(buf + strlen(datadir) + strlen(EINA_PATH_SEP_S));
data/efl-1.25.1/src/lib/eina/eina_prefix.c:512:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        magic = alloca(strlen(magicsharefile) + 1);
data/efl-1.25.1/src/lib/eina/eina_prefix.c:662:24:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                       strncpy(pfx->prefix_path, pfx->exe_path,
data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c:570:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   end = buf + strlen(buf);
data/efl-1.25.1/src/lib/eina/eina_simple_xml_parser.c:1051:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   unsigned i, indent_len = strlen(indent);
data/efl-1.25.1/src/lib/eina/eina_slice.h:463:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define EINA_SLICE_STR(str) {strlen((str)), (str)}
data/efl-1.25.1/src/lib/eina/eina_slice.h:465:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define EINA_SLICE_STR(str) {.len = strlen((str)), .mem = (str)}
data/efl-1.25.1/src/lib/eina/eina_slice.h:486:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define EINA_SLICE_STR_FULL(str) {strlen((str)) + 1, (str)}
data/efl-1.25.1/src/lib/eina/eina_slice.h:488:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define EINA_SLICE_STR_FULL(str) {.len = strlen((str)) + 1, .mem = (str)}
data/efl-1.25.1/src/lib/eina/eina_slstr.c:105:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(string) + 1;
data/efl-1.25.1/src/lib/eina/eina_slstr.c:140:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(string) + 1;
data/efl-1.25.1/src/lib/eina/eina_str.c:65:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   str_len = strlen(str);
data/efl-1.25.1/src/lib/eina/eina_str.c:119:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   dlen = strlen(delim);
data/efl-1.25.1/src/lib/eina/eina_str.c:153:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = src - str + strlen(src);
data/efl-1.25.1/src/lib/eina/eina_str.c:363:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     return(dlen + (s ? strlen(s) : 0));
data/efl-1.25.1/src/lib/eina/eina_str.c:385:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   const size_t flen = strlen(format);
data/efl-1.25.1/src/lib/eina/eina_str.c:421:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   str_len = strlen(str);
data/efl-1.25.1/src/lib/eina/eina_str.c:520:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   inb = strlen(text);
data/efl-1.25.1/src/lib/eina/eina_str.c:656:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   s2 = malloc((strlen(str) * 2) + 1);
data/efl-1.25.1/src/lib/eina/eina_strbuf.c:58:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define _STRBUF_STRLEN_FUNC(x)    strlen(x)
data/efl-1.25.1/src/lib/eina/eina_strbuf.c:214:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(str,((char *)(buf->buf)) + pos, len);
data/efl-1.25.1/src/lib/eina/eina_strbuf.c:241:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   eina_strbuf_insert_length(buf, outputbuf, strlen(outputbuf), pos);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:951:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len1 = strlen(str);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:952:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len2 = strlen(with);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:1007:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len1 = strlen(str);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:1008:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len2 = strlen(with);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:1067:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len1 = strlen(str);
data/efl-1.25.1/src/lib/eina/eina_strbuf_common.c:1068:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len2 = strlen(with);
data/efl-1.25.1/src/lib/eina/eina_stringshare.c:609:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return eina_stringshare_add_length(str, strlen(str));
data/efl-1.25.1/src/lib/eina/eina_stringshare.c:702:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     slen = 3 + (int)strlen(str + 3);
data/efl-1.25.1/src/lib/eina/eina_thread.c:255:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, name, 15);
data/efl-1.25.1/src/lib/eina/eina_thread_queue.c:42:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   Eina_Thread_Queue_Msg_Block  *read; // block when reading starts from data
data/efl-1.25.1/src/lib/eina/eina_thread_queue.c:304:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (!thq->read)
data/efl-1.25.1/src/lib/eina/eina_thread_queue.c:328:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   blk = thq->read;
data/efl-1.25.1/src/lib/eina/eina_tmpstr.c:76:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(s->str, str, length);
data/efl-1.25.1/src/lib/eina/eina_tmpstr.c:110:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(str);
data/efl-1.25.1/src/lib/eina/eina_tmpstr.c:120:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(str);
data/efl-1.25.1/src/lib/eina/eina_tmpstr.c:158:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strs) return strlen(tmpstr);
data/efl-1.25.1/src/lib/eina/eina_tmpstr.c:171:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return strlen(tmpstr);
data/efl-1.25.1/src/lib/eina/eina_util.c:123:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (tmp && tmp[strlen(tmp) -1] == '/')
data/efl-1.25.1/src/lib/eina/eina_util.c:126:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        tmp2[strlen(tmp2) - 1] = 0x0;
data/efl-1.25.1/src/lib/eina/eina_value.c:3016:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return (int)strlen(key) + 1;
data/efl-1.25.1/src/lib/eina/eina_value.c:3791:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             desc.size = strlen(str) + 1;
data/efl-1.25.1/src/lib/eina/eina_vpath.c:246:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(name, path + 1, p - path - 1);
data/efl-1.25.1/src/lib/eina/eina_vpath.c:301:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(name, path + 2, end - path - offset);
data/efl-1.25.1/src/lib/eina/eina_xattr.c:80:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   it->offset += strlen(it->attr->name) + 1;
data/efl-1.25.1/src/lib/eina/eina_xattr.c:115:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   it->offset += strlen(it->attr->name) + 1;
data/efl-1.25.1/src/lib/eina/eina_xattr.c:147:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   it->offset += strlen(it->xattr + it->offset) + 1;
data/efl-1.25.1/src/lib/eina/eina_xattr.c:519:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return eina_xattr_set(file, attribute, data, strlen(data) + 1, flags);
data/efl-1.25.1/src/lib/eina/eina_xattr.c:561:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!eina_convert_atod(tmp, strlen(tmp), &m, &e))
data/efl-1.25.1/src/lib/eina/eina_xattr.c:650:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   for (i = 0; i < length; i += strlen(attr) + 1, attr += strlen(attr) + 1)
data/efl-1.25.1/src/lib/eina/eina_xattr.c:650:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   for (i = 0; i < length; i += strlen(attr) + 1, attr += strlen(attr) + 1)
data/efl-1.25.1/src/lib/eio/efl_io_model.c:133:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(info.path, mi->path, (EINA_PATH_MAX - 1));
data/efl-1.25.1/src/lib/eio/eio_eet.c:292:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   er->done_cb.read((void*) er->common.data, &er->common,
data/efl-1.25.1/src/lib/eio/eio_monitor_cocoa.c:102:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(event_info->path) - strlen(backend->real_path);
data/efl-1.25.1/src/lib/eio/eio_monitor_cocoa.c:102:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(event_info->path) - strlen(backend->real_path);
data/efl-1.25.1/src/lib/eio/eio_monitor_cocoa.c:115:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 &(event_info->path[strlen(backend->real_path) + 1]));
data/efl-1.25.1/src/lib/eio/eio_monitor_inotify.c:98:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = file ? strlen(file) : 0;
data/efl-1.25.1/src/lib/eio/eio_monitor_inotify.c:136:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   size = read(fd, buffer, sizeof(buffer));
data/efl-1.25.1/src/lib/eio/eio_private.h:203:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Eio_Done_Read_Cb read;
data/efl-1.25.1/src/lib/eio/eio_xattr.c:199:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       async->common.length = strlen(async->todo.xstring.xattr_string) + 1;
data/efl-1.25.1/src/lib/eio/eio_xattr.c:520:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(xattr_string) + 1;
data/efl-1.25.1/src/lib/eldbus/eldbus_core.c:380:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   unsigned int keylen = strlen(key);
data/efl-1.25.1/src/lib/eldbus/eldbus_core.c:399:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   unsigned int keylen = strlen(key);
data/efl-1.25.1/src/lib/eldbus/eldbus_introspection.c:39:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   xml_root = eina_simple_xml_node_load(xml, strlen(xml), EINA_TRUE);
data/efl-1.25.1/src/lib/eldbus/eldbus_message_from_eina_value.c:58:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           unsigned i = strlen(type+2);//remove 'a()' of len a(sv)
data/efl-1.25.1/src/lib/eldbus/eldbus_message_from_eina_value.c:344:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             unsigned len = strlen(type+1) -1;
data/efl-1.25.1/src/lib/eldbus/eldbus_message_helper.c:14:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(iter_sig + 1);
data/efl-1.25.1/src/lib/eldbus/eldbus_service.c:379:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        baselen = strlen(obj->path);
data/efl-1.25.1/src/lib/eldbus/eldbus_service.c:631:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t len = strlen(obj->path);
data/efl-1.25.1/src/lib/eldbus/eldbus_service.c:691:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   pathlen = strlen(obj->path);
data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c:50:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((eina_strbuf_length_get(match) + strlen(",=''") + strlen(key) + strlen(value))
data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c:50:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((eina_strbuf_length_get(match) + strlen(",=''") + strlen(key) + strlen(value))
data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c:50:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((eina_strbuf_length_get(match) + strlen(",=''") + strlen(key) + strlen(value))
data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c:74:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   const char *key = NULL, *read;
data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c:83:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   for (read = va_arg(ap, char *); read; read = va_arg(ap, char *))
data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c:89:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
             key = read;
data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c:94:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp(key, ARGX, strlen(ARGX)))
data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c:96:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             int id = atoi(key + strlen(ARGX));
data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c:98:48:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
             arg->value = eina_stringshare_add(read);
data/efl-1.25.1/src/lib/eldbus/eldbus_signal_handler.c:103:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
             _match_append(sh->match, key, read);
data/efl-1.25.1/src/lib/elementary/efl_datetime_manager.c:119:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  len = strlen(expanded_fmt);
data/efl-1.25.1/src/lib/elementary/efl_datetime_manager.c:122:19:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
                  strncat(buf, expanded_fmt, len);
data/efl-1.25.1/src/lib/elementary/efl_datetime_manager.c:134:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(dt_fmt, buf, MAX_FORMAT_LEN);
data/efl-1.25.1/src/lib/elementary/efl_datetime_manager.c:178:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(pd->format, nl_langinfo(D_T_FMT), MAX_FORMAT_LEN);
data/efl-1.25.1/src/lib/elementary/efl_datetime_manager.c:180:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
   strncpy(pd->format, "", MAX_FORMAT_LEN);
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:314:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               len = strlen(expanded_fmt);
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:317:16:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
               strncat(buf, expanded_fmt, len);
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:329:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     strncpy(dt_fmt, buf, EFL_UI_CLOCK_MAX_FORMAT_LEN);
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:440:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     strncpy(sd->format, nl_langinfo(D_T_FMT), EFL_UI_CLOCK_MAX_FORMAT_LEN);
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:442:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
     strncpy(sd->format, "", EFL_UI_CLOCK_MAX_FORMAT_LEN);
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:449:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(dt_fmt, sd->format, EFL_UI_CLOCK_MAX_FORMAT_LEN);
data/efl-1.25.1/src/lib/elementary/efl_ui_clock.c:900:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(sd->format, fmt, EFL_UI_CLOCK_MAX_FORMAT_LEN);
data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_interactive.c:392:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size = strlen(s);
data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_interactive.c:411:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size = strlen(s);
data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_interactive.c:424:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size = strlen(s);
data/efl-1.25.1/src/lib/elementary/efl_ui_internal_text_interactive.c:488:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(preedit_string) > 0)
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:311:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp(sub_d->part, "elm.swallow.", strlen("elm.swallow.")))
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:312:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          type = sub_d->part + strlen("elm.swallow.");
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:318:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp(sub_d->part, "efl.", strlen("efl.")))
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:319:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          type = sub_d->part + strlen("efl.");
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:359:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp(sub_d->part, "elm.text.", strlen("elm.text.")))
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:360:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          type = sub_d->part + strlen("elm.text.");
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:366:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp(sub_d->part, "efl.", strlen("efl.")))
data/efl-1.25.1/src/lib/elementary/efl_ui_layout.c:367:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          type = sub_d->part + strlen("efl.");
data/efl-1.25.1/src/lib/elementary/efl_ui_panes.c:67:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   temp_str = cur_group + len - strlen(search);
data/efl-1.25.1/src/lib/elementary/efl_ui_panes.c:88:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(cur_group);
data/efl-1.25.1/src/lib/elementary/efl_ui_progressbar.c:560:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char signal_buffer[strlen(signal) + strlen("start") + 1];
data/efl-1.25.1/src/lib/elementary/efl_ui_progressbar.c:560:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char signal_buffer[strlen(signal) + strlen("start") + 1];
data/efl-1.25.1/src/lib/elementary/efl_ui_slider.c:369:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   temp_str = cur_group + len - strlen(search);
data/efl-1.25.1/src/lib/elementary/efl_ui_slider.c:389:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(cur_group);
data/efl-1.25.1/src/lib/elementary/efl_ui_slider_interval.c:260:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   temp_str = cur_group + len - strlen(search);
data/efl-1.25.1/src/lib/elementary/efl_ui_slider_interval.c:280:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(cur_group);
data/efl-1.25.1/src/lib/elementary/efl_ui_spin_button.c:277:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(result, text, pos);
data/efl-1.25.1/src/lib/elementary/efl_ui_spin_button.c:312:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if ((int) strlen(point + 1) > decimal_places)
data/efl-1.25.1/src/lib/elementary/efl_ui_spin_button.c:322:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(new_str);
data/efl-1.25.1/src/lib/elementary/efl_ui_tags.c:549:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sd->n_str = str ? strlen(str) : 0;
data/efl-1.25.1/src/lib/elementary/efl_ui_tags.c:663:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(str) &&
data/efl-1.25.1/src/lib/elementary/efl_ui_tags.c:710:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strlen(str))
data/efl-1.25.1/src/lib/elementary/efl_ui_textbox.c:428:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (!strncmp(eina_content_type_get(content), "image/", strlen("image/")))
data/efl-1.25.1/src/lib/elementary/efl_ui_textbox.c:485:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncmp(mime_type, "image/", strlen("image/")))
data/efl-1.25.1/src/lib/elementary/efl_ui_textbox.c:1619:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (colorcode && _format_color_parse(colorcode, strlen(colorcode), &r, &g, &b, &a))
data/efl-1.25.1/src/lib/elementary/efl_ui_textbox.c:1644:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (colorcode && _format_color_parse(colorcode, strlen(colorcode), &r, &g, &b, &a))
data/efl-1.25.1/src/lib/elementary/efl_ui_textbox.c:2418:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int size = strlen(txt);
data/efl-1.25.1/src/lib/elementary/efl_ui_textbox.c:2876:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else len = strlen(start);
data/efl-1.25.1/src/lib/elementary/efl_ui_textbox.c:2879:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(tmp, start, len);
data/efl-1.25.1/src/lib/elementary/efl_ui_view_model.c:229:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(definition) == 0) return 0;
data/efl-1.25.1/src/lib/elementary/efl_ui_view_model.c:231:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return strlen(definition);
data/efl-1.25.1/src/lib/elementary/efl_ui_view_model.c:249:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strlen(name)) return EFL_MODEL_ERROR_INCORRECT_VALUE;
data/efl-1.25.1/src/lib/elementary/efl_ui_view_model.c:250:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strlen(definition)) return EFL_MODEL_ERROR_INCORRECT_VALUE;
data/efl-1.25.1/src/lib/elementary/efl_ui_widget.c:2962:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                  strncpy(t, b, s - b);
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:839:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       size_t size = sizeof(char) * (strlen(tmp) + 16);
data/efl-1.25.1/src/lib/elementary/efl_ui_win.c:843:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                            strncpy(repname, tmp, dotptr - tmp);
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:537:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (strlen(tok[j]) < 1) continue;
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:609:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(temp_path, path, sizeof(temp_path) - 1);
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:1583:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (en && strlen(en) > 0)
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:1585:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               memmove(buf, en, strlen(en) -1);
data/efl-1.25.1/src/lib/elementary/elc_fileselector.c:1586:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               buf[strlen(en) -1] = '\0';
data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry.c:1034:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sd->n_str = str ? strlen(str) : 0;
data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry.c:1149:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(str) &&
data/efl-1.25.1/src/lib/elementary/elc_multibuttonentry.c:1196:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strlen(str))
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:517:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     strncpy(buf, nit->title_label, sizeof(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:520:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((nit->title_label) && (strlen(buf) < (sizeof(buf) - 2)))
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:521:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
          strcat(buf, " ");
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:522:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(buf, nit->subtitle_label, sizeof(buf) - strlen(buf) - 2);
data/efl-1.25.1/src/lib/elementary/elc_naviframe.c:522:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(buf, nit->subtitle_label, sizeof(buf) - strlen(buf) - 2);
data/efl-1.25.1/src/lib/elementary/elm_access.c:262:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (txt && (strlen(txt) > 0))
data/efl-1.25.1/src/lib/elementary/elm_atspi_bridge.c:1513:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int size = strlen(txt);
data/efl-1.25.1/src/lib/elementary/elm_atspi_bridge.c:2443:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int len = strlen(ELM_ACCESS_OBJECT_PATH_PREFIX);
data/efl-1.25.1/src/lib/elementary/elm_cnp.c:104:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (!strncmp(mime_type, "text/", strlen("text/")))
data/efl-1.25.1/src/lib/elementary/elm_cnp.c:106:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (!strncmp(mime_type, "image/", strlen("image/")))
data/efl-1.25.1/src/lib/elementary/elm_code_file.c:51:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(line->modified, content, length);
data/efl-1.25.1/src/lib/elementary/elm_code_file.c:97:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   dirlen = strlen(path) - strlen(name);
data/efl-1.25.1/src/lib/elementary/elm_code_file.c:97:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   dirlen = strlen(path) - strlen(name);
data/efl-1.25.1/src/lib/elementary/elm_code_file.c:99:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   tmp = malloc(sizeof(char) * (strlen(path) + 6));
data/efl-1.25.1/src/lib/elementary/elm_code_file.c:102:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   snprintf(tmp + dirlen, strlen(name) + 6, ".%s.tmp", name);
data/efl-1.25.1/src/lib/elementary/elm_code_indent.c:64:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(buf, prevtext, count);
data/efl-1.25.1/src/lib/elementary/elm_code_indent.c:104:16:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
               strcpy(buf + count, "*");
data/efl-1.25.1/src/lib/elementary/elm_code_indent.c:113:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             unsigned int offset = strlen(indent) - 1;
data/efl-1.25.1/src/lib/elementary/elm_code_parse.c:120:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(replace, old + count, line->length - count);
data/efl-1.25.1/src/lib/elementary/elm_code_syntax.c:204:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (strlen(*keyword) == length && !strncmp(token, *keyword, length))
data/efl-1.25.1/src/lib/elementary/elm_code_syntax.c:227:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   prefix_length = strlen(prefix);
data/efl-1.25.1/src/lib/elementary/elm_code_syntax.c:311:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                i2 += strlen(syntax->comment_end) - 1;
data/efl-1.25.1/src/lib/elementary/elm_code_syntax.c:349:91:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (syntax->preprocessor && _content_starts_with(content+i, syntax->preprocessor, strlen(syntax->preprocessor)))
data/efl-1.25.1/src/lib/elementary/elm_code_syntax.c:366:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             for (i2 = i+strlen(syntax->comment_start); i2 < length; i2++)
data/efl-1.25.1/src/lib/elementary/elm_code_syntax.c:369:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    i2 += strlen(syntax->comment_end) - 1;
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:43:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(newtext, chars, length);
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:64:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   searchlen = strlen(search);
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:165:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(inserted, line->modified, position);
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:166:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(inserted + position, string, length);
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:167:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(inserted + position + length, line->modified + position, line->length - position);
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:173:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(inserted, line->content, position);
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:174:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(inserted + position, string, length);
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:175:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(inserted + position + length, line->content + position, line->length - position);
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:206:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(removed, line->modified, position);
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:207:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(removed + position, line->modified + position + length, line->length - position - length);
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:213:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(removed, line->content, position);
data/efl-1.25.1/src/lib/elementary/elm_code_text.c:214:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(removed + position, line->content + position + length, line->length - position - length);
data/efl-1.25.1/src/lib/elementary/elm_code_widget.c:865:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             text = malloc((strlen(template) + strlen(line->status_text) + 1) * sizeof(char));
data/efl-1.25.1/src/lib/elementary/elm_code_widget.c:865:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             text = malloc((strlen(template) + strlen(line->status_text) + 1) * sizeof(char));
data/efl-1.25.1/src/lib/elementary/elm_code_widget.c:1497:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                           strlen(selection_text),
data/efl-1.25.1/src/lib/elementary/elm_code_widget.c:1576:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     strlen(leading));
data/efl-1.25.1/src/lib/elementary/elm_code_widget.c:1579:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   textlen = strlen(leading) + 2;
data/efl-1.25.1/src/lib/elementary/elm_code_widget.c:1585:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   change = _elm_code_widget_change_create(width + 1, row, indent - 1, row + 1, text, strlen(text), EINA_TRUE);
data/efl-1.25.1/src/lib/elementary/elm_code_widget_selection.c:192:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(content, old, start);
data/efl-1.25.1/src/lib/elementary/elm_code_widget_selection.c:199:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(content, old, start);
data/efl-1.25.1/src/lib/elementary/elm_code_widget_selection.c:200:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(content + start, old + end + 1,
data/efl-1.25.1/src/lib/elementary/elm_code_widget_selection.c:246:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(content, first, start);
data/efl-1.25.1/src/lib/elementary/elm_code_widget_selection.c:422:85:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   elm_cnp_selection_set(widget, ELM_SEL_TYPE_CLIPBOARD, ELM_SEL_FORMAT_TEXT, text, strlen(text));
data/efl-1.25.1/src/lib/elementary/elm_code_widget_selection.c:441:85:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   elm_cnp_selection_set(widget, ELM_SEL_TYPE_CLIPBOARD, ELM_SEL_FORMAT_TEXT, text, strlen(text));
data/efl-1.25.1/src/lib/elementary/elm_code_widget_text.c:61:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ret_len = strlen(first) + strlen(last) + newline_len;
data/efl-1.25.1/src/lib/elementary/elm_code_widget_text.c:61:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ret_len = strlen(first) + strlen(last) + newline_len;
data/efl-1.25.1/src/lib/elementary/elm_code_widget_text.c:72:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   snprintf(ret, strlen(first) + newline_len + 1, "%s%s", first, newline);
data/efl-1.25.1/src/lib/elementary/elm_code_widget_text.c:75:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ptr += strlen(first) + newline_len;
data/efl-1.25.1/src/lib/elementary/elm_code_widget_text.c:86:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   snprintf(ptr, strlen(last) + 1, "%s", last);
data/efl-1.25.1/src/lib/elementary/elm_code_widget_text.c:313:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   _elm_code_widget_text_at_cursor_insert_do(widget, text, strlen(text), EINA_TRUE);
data/efl-1.25.1/src/lib/elementary/elm_code_widget_undo.c:103:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                                 strlen(content));
data/efl-1.25.1/src/lib/elementary/elm_config.c:686:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   user_dir_len = strlen(dst);
data/efl-1.25.1/src/lib/elementary/elm_config.c:854:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char *buf = alloca(strlen(option) + 1);
data/efl-1.25.1/src/lib/elementary/elm_config.c:882:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char *buf = alloca(strlen(derive_options) + 1);
data/efl-1.25.1/src/lib/elementary/elm_config.c:1393:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (len) len = strlen(buf);
data/efl-1.25.1/src/lib/elementary/elm_config.c:1424:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           strlen(_elm_data_dir), "config",
data/efl-1.25.1/src/lib/elementary/elm_config.c:1731:88:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        EINA_SAFETY_ON_FALSE_RETURN_VAL(eet_data_undump(ef, "config", embedded_config, strlen(embedded_config)-1, EINA_FALSE), NULL);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2145:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ok = eet_write(ef, "config", _elm_profile, strlen(_elm_profile), 0);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2693:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        buf2 = alloca(strlen(s) + 1);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2703:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                  strncpy(buf2, pp, len);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2882:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             char *namelower = alloca(strlen(wb->name) + 1);
data/efl-1.25.1/src/lib/elementary/elm_config.c:2916:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   namelower = alloca(strlen(name) + 1);
data/efl-1.25.1/src/lib/elementary/elm_config.c:3124:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     _elm_data_dir, strlen(_elm_data_dir),
data/efl-1.25.1/src/lib/elementary/elm_config.c:3125:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     buf2, strlen(buf2));
data/efl-1.25.1/src/lib/elementary/elm_conform.c:73:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(buf, env_val, sizeof(buf));
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:229:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   day = atoi(item + (strlen(item) - 1));
data/efl-1.25.1/src/lib/elementary/elm_dayselector.c:322:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   day = atoi(item + (strlen(item) - 1));
data/efl-1.25.1/src/lib/elementary/elm_diskselector.c:220:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, it->label, length);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:713:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(tag_string) + strlen(buf);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:713:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(tag_string) + strlen(buf);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:1631:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     (obj, seltype, ELM_SEL_FORMAT_MARKUP, sel, strlen(sel) + 1);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:3108:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   current_len = strlen(*text);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:3134:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(markup, new_text, idx);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:3140:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    unit_size = strlen(utfstr);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:3293:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(entry);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:3367:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(entry);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:3423:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        tlen = strlen(text);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:4873:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(current);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:4874:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        newlen = strlen(utfstr);
data/efl-1.25.1/src/lib/elementary/elm_entry.c:4958:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                            strncpy(tag, (*text) + last_read_idx, read_idx - last_read_idx);
data/efl-1.25.1/src/lib/elementary/elm_flipselector.c:150:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(label) > strlen(elm_object_item_text_get(DATA_GET(sd->sentinel))))
data/efl-1.25.1/src/lib/elementary/elm_flipselector.c:150:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(label) > strlen(elm_object_item_text_get(DATA_GET(sd->sentinel))))
data/efl-1.25.1/src/lib/elementary/elm_flipselector.c:206:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(elm_object_item_text_get(it)) >
data/efl-1.25.1/src/lib/elementary/elm_flipselector.c:207:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strlen(elm_object_item_text_get(DATA_GET(sd->sentinel))))
data/efl-1.25.1/src/lib/elementary/elm_flipselector.c:341:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(label);
data/efl-1.25.1/src/lib/elementary/elm_flipselector.c:714:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       (strlen(elm_object_item_text_get(item)) >
data/efl-1.25.1/src/lib/elementary/elm_flipselector.c:715:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(elm_object_item_text_get(DATA_GET(sd->sentinel)))))
data/efl-1.25.1/src/lib/elementary/elm_flipselector.c:743:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       (strlen(elm_object_item_text_get(item)) >
data/efl-1.25.1/src/lib/elementary/elm_flipselector.c:744:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(elm_object_item_text_get(DATA_GET(sd->sentinel)))))
data/efl-1.25.1/src/lib/elementary/elm_font.c:16:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       !strncmp(token, ELM_FONT_TOKEN_STYLE, strlen(ELM_FONT_TOKEN_STYLE)))
data/efl-1.25.1/src/lib/elementary/elm_font.c:25:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(name, font, len);
data/efl-1.25.1/src/lib/elementary/elm_font.c:58:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        style = token + strlen(ELM_FONT_TOKEN_STYLE);
data/efl-1.25.1/src/lib/elementary/elm_font.c:70:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                  strncpy(style, style_old, len);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:546:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(buf, "item", sizeof(buf));
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:548:12:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
           strncat(buf, "_compress", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:548:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           strncat(buf, "_compress", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:551:12:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
           strncat(buf, "_odd", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:551:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           strncat(buf, "_odd", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:552:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
        strncat(buf, "/", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:552:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(buf, "/", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:553:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(buf, style, sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:553:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(buf, style, sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:1422:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
     strncpy(buf, "tree", sizeof(buf));
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:1423:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
   else strncpy(buf, "item", sizeof(buf));
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:1425:6:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
     strncat(buf, "_compress", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:1425:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     strncat(buf, "_compress", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:1427:4:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
   strncat(buf, "/", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:1427:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   strncat(buf, "/", sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:1428:4:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
   strncat(buf, it->itc->decorate_all_item_style, sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_genlist.c:1428:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   strncat(buf, it->itc->decorate_all_item_style, sizeof(buf) - strlen(buf) - 1);
data/efl-1.25.1/src/lib/elementary/elm_index.c:790:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            temp = realloc(label, strlen(label) +
data/efl-1.25.1/src/lib/elementary/elm_index.c:791:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                            strlen(last) + 1);
data/efl-1.25.1/src/lib/elementary/elm_label.c:106:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        plainlen = strlen(plaintxt);
data/efl-1.25.1/src/lib/elementary/elm_label.c:263:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int key_len = strlen(key);
data/efl-1.25.1/src/lib/elementary/elm_label.c:302:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          val_end_idx = kvalue - srcstring + strlen(kvalue) - 1;
data/efl-1.25.1/src/lib/elementary/elm_label.c:305:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        key_start_idx = kvalue - srcstring - 1 - strlen(key);
data/efl-1.25.1/src/lib/elementary/elm_label.c:466:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(text);
data/efl-1.25.1/src/lib/elementary/elm_label.c:543:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(text);
data/efl-1.25.1/src/lib/elementary/elm_main.c:1041:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   exe2 = malloc(strlen(exe) + 1 + 7 + strlen(LIBEXT));
data/efl-1.25.1/src/lib/elementary/elm_main.c:1041:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   exe2 = malloc(strlen(exe) + 1 + 7 + strlen(LIBEXT));
data/efl-1.25.1/src/lib/elementary/elm_main.c:1046:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   exename = alloca(strlen(p) + 1);
data/efl-1.25.1/src/lib/elementary/elm_main.c:1330:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        buf2 = alloca(strlen(path) + 1);
data/efl-1.25.1/src/lib/elementary/elm_main.c:1340:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                  strncpy(buf2, pp, len);
data/efl-1.25.1/src/lib/elementary/elm_map.c:241:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
   else strcpy(buf, "");
data/efl-1.25.1/src/lib/elementary/elm_map.c:721:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((!url) || (!strlen(url)))
data/efl-1.25.1/src/lib/elementary/elm_map.c:2776:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strncmp(key, NOMINATIM_ATTR_LON, strlen(NOMINATIM_ATTR_LON)))
data/efl-1.25.1/src/lib/elementary/elm_map.c:2778:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (!strncmp(key, NOMINATIM_ATTR_LAT, strlen(NOMINATIM_ATTR_LAT)))
data/efl-1.25.1/src/lib/elementary/elm_map.c:2780:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else if (!strncmp(key, NOMINATIM_ATTR_ADDRESS, strlen(NOMINATIM_ATTR_ADDRESS)))
data/efl-1.25.1/src/lib/elementary/elm_map.c:2870:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if (!strncmp(value, NOMINATIM_RESULT, strlen(NOMINATIM_RESULT)))
data/efl-1.25.1/src/lib/elementary/elm_module.c:83:24:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                       strncpy(n, p, pe - p);
data/efl-1.25.1/src/lib/elementary/elm_prefs.c:340:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(buf, name, PATH_MAX - 1);
data/efl-1.25.1/src/lib/elementary/elm_prefs.c:1808:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!strlen(prefix))
data/efl-1.25.1/src/lib/elementary/elm_prefs_data.c:696:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(key, path, n);
data/efl-1.25.1/src/lib/elementary/elm_prefs_data.c:772:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(key, path, n);
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:541:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(result, text, pos);
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:572:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(new_str);
data/efl-1.25.1/src/lib/elementary/elm_spinner.c:580:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if ((int) strlen(point + 1) > sd->decimal_points)
data/efl-1.25.1/src/lib/elementary/elm_theme.c:1046:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(base);
data/efl-1.25.1/src/lib/elementary/elm_util.c:17:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   return strncpy(dest, src, count);
data/efl-1.25.1/src/lib/elementary/elm_util.c:23:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int txt_len = strlen(txt);
data/efl-1.25.1/src/lib/elementary/elm_util.c:62:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   buf = alloca(strlen(s) + 1);
data/efl-1.25.1/src/lib/elput/elput_evdev.c:320:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ev = calloc(1, sizeof(Ecore_Event_Key) + strlen(key) + strlen(keyname) +
data/efl-1.25.1/src/lib/elput/elput_evdev.c:320:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ev = calloc(1, sizeof(Ecore_Event_Key) + strlen(key) + strlen(keyname) +
data/efl-1.25.1/src/lib/elput/elput_evdev.c:321:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               ((compose[0] != '\0') ? strlen(compose) : 0) + 3);
data/efl-1.25.1/src/lib/elput/elput_evdev.c:325:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ev->key = ev->keyname + strlen(keyname) + 1;
data/efl-1.25.1/src/lib/elput/elput_evdev.c:326:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ev->compose = strlen(compose) ? ev->key + strlen(key) + 1 : NULL;
data/efl-1.25.1/src/lib/elput/elput_evdev.c:326:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ev->compose = strlen(compose) ? ev->key + strlen(key) + 1 : NULL;
data/efl-1.25.1/src/lib/elput/elput_evdev.c:331:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(compose)) strcpy((char *)ev->compose, compose);
data/efl-1.25.1/src/lib/elput/elput_input.c:70:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
             if (read(p[0], &fd, sizeof(int)) < 1)
data/efl-1.25.1/src/lib/elua/elua.c:90:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     l = path + strlen(path);
data/efl-1.25.1/src/lib/elua/elua.c:797:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                      strlen(chunk), chname)
data/efl-1.25.1/src/lib/elua/io.c:152:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   int c = getc(f);
data/efl-1.25.1/src/lib/elua/io.c:172:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(p);
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:351:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(name) > sNAMEMAX) return;
data/efl-1.25.1/src/lib/embryo/embryo_amx.c:1045:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  len = strlen(pr->string);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:124:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   l = strlen(s1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:139:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return (Embryo_Cell)strlen(s1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:153:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   s3 = alloca(strlen(s1) + strlen(s2) + 1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:153:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   s3 = alloca(strlen(s1) + strlen(s2) + 1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:175:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   l1 = strlen(s1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:176:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   l2 = strlen(s2);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:180:4:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
   strncat(s3, s2, params[3]);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:197:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   s3 = alloca(strlen(s1) + strlen(s2) + 1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:197:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   s3 = alloca(strlen(s1) + strlen(s2) + 1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:219:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   l1 = strlen(s1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:220:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   l2 = strlen(s2);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:223:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(s3, s2, params[3]);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:245:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   l1 = strlen(s1);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:254:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(s2, s1 + params[3], params[4] - params[3]);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:340:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        l = strlen(tmp);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:360:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        l = strlen(tmp);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:381:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             l = strlen(tmp);
data/efl-1.25.1/src/lib/embryo/embryo_str.c:449:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   max_len = strlen(s1) + (params[0] - 1) * 256;
data/efl-1.25.1/src/lib/embryo/embryo_time.c:101:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     strncpy(prevtz, tzenv, sizeof(prevtz) - 1);
data/efl-1.25.1/src/lib/emile/emile_cipher_gnutls.c:441:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                r->name, strlen(r->name));
data/efl-1.25.1/src/lib/emotion/emotion_modules.c:282:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   inlen = strlen(name);
data/efl-1.25.1/src/lib/emotion/emotion_modules.c:293:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for (p = path + strlen(path) - 1;
data/efl-1.25.1/src/lib/eo/eo.c:3265:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cls_name.len = strlen(cls_name.mem);
data/efl-1.25.1/src/lib/eo/eo.c:3382:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       slice.len = strlen(s);
data/efl-1.25.1/src/lib/eo/eo.c:3429:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       slice.len = strlen(s);
data/efl-1.25.1/src/lib/eo/eo_base_class.c:634:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             klass = alloca(strlen(search) + 1);
data/efl-1.25.1/src/lib/eolian/database_constructor_api.c:23:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       ctor->base.name + strlen(klass->base.name) + 1, EOLIAN_UNRESOLVED);
data/efl-1.25.1/src/lib/eolian/database_function_api.c:59:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int len = strlen(last_p);
data/efl-1.25.1/src/lib/eolian/database_function_api.c:65:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int plen = strlen(prefix);
data/efl-1.25.1/src/lib/eolian/database_type.c:86:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (ct[strlen(ct) - 1] == '*');
data/efl-1.25.1/src/lib/eolian/database_validate.c:378:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     if (ct && ct[strlen(ct) - 1] != '*')
data/efl-1.25.1/src/lib/eolian/database_validate.c:832:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t imlen = strlen(impl->base.name);
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:149:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     memcpy(buf, ls->t.value.s, strlen(ls->t.value.s) + 1);
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:274:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t clen = strlen(cname);
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:489:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int read;
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:497:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        switch (read)
data/efl-1.25.1/src/lib/eolian/eo_lexer.c:1285:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memcpy(buf, v, strlen(v) + 1);
data/efl-1.25.1/src/lib/eolian/eolian_database.c:113:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t nstrl = strlen(obj->name) + 1;
data/efl-1.25.1/src/lib/eolian/eolian_database.c:391:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ret->text_end = pschr ? pschr : (doc + strlen(doc));
data/efl-1.25.1/src/lib/eolian_cxx/grammar/string.hpp:39:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      std::copy(string, string + std::strlen(string), sink);
data/efl-1.25.1/src/lib/ethumb/ethumb.c:932:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   uri = alloca(3 * strlen(file) + 9);
data/efl-1.25.1/src/lib/ethumb/ethumb.c:952:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   MD5Update (&ctx, (unsigned char const*)uri, (unsigned)strlen (uri));
data/efl-1.25.1/src/lib/ethumb/ethumb.c:1335:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   buf = alloca(strlen(e->thumb_path) + 1 + 5);
data/efl-1.25.1/src/lib/ethumb/ethumb.c:1337:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(dname);
data/efl-1.25.1/src/lib/ethumb_client/ethumb_client.c:757:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size = strlen(string) + 1;
data/efl-1.25.1/src/lib/evas/cache/evas_cache_image.c:779:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   key_length = key ? strlen(key) : 6;
data/efl-1.25.1/src/lib/evas/cache/evas_cache_image.c:875:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   file_length = strlen(file);
data/efl-1.25.1/src/lib/evas/cache/evas_cache_image.c:876:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   key_length = key ? strlen(key) : 6;
data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_object.c:255:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int pl = pname ? strlen(pname) : 0;
data/efl-1.25.1/src/lib/evas/canvas/efl_canvas_vg_object.c:256:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int cl = file ? strlen(file) : 0;
data/efl-1.25.1/src/lib/evas/canvas/efl_text_cursor_object.c:240:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(ts, s, p - s);
data/efl-1.25.1/src/lib/evas/canvas/efl_text_cursor_object.c:265:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(_PARAGRAPH_SEPARATOR_UTF8)))
data/efl-1.25.1/src/lib/evas/canvas/efl_text_cursor_object.c:268:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             n = strlen(_PARAGRAPH_SEPARATOR_UTF8);
data/efl-1.25.1/src/lib/evas/canvas/efl_text_cursor_object.c:270:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp(_NEWLINE_UTF8, off, strlen(_NEWLINE_UTF8)))
data/efl-1.25.1/src/lib/evas/canvas/efl_text_cursor_object.c:273:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             n = strlen(_NEWLINE_UTF8);
data/efl-1.25.1/src/lib/evas/canvas/efl_text_cursor_object.c:275:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp(_TAB_UTF8, off, strlen(_TAB_UTF8)))
data/efl-1.25.1/src/lib/evas/canvas/efl_text_cursor_object.c:278:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             n = strlen(_TAB_UTF8);
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:207:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(nm, pp, p - pp);
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:489:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(cur);
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:613:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          tend = name + strlen(name);
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:934:24:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                       strncpy(tmp, start, end - start);
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1277:16:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
        while (fscanf(f, "%4090s %[^\n]\n", fname, fdef) == 2)
data/efl-1.25.1/src/lib/evas/canvas/evas_font_dir.c:1334:16:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
        while (fscanf(f, "%4090s %4090[^\n]\n", fname, fdef) == 2)
data/efl-1.25.1/src/lib/evas/canvas/evas_image_legacy.c:236:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        tflags = alloca(strlen(flags) + 1);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:978:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define ESCAPE_VALUE(e,v) {e,v,strlen(e),strlen(v)}
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:978:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define ESCAPE_VALUE(e,v) {e,v,strlen(e),strlen(v)}
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:1387:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(ts, s, p - s);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3056:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              tend = param + strlen(param);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3061:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
           if (equal)
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3063:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 char font_param[strlen(font_prefix) + (equal - param)];
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3066:18:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
                 strncat(font_param, &param[1], equal - param -1);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3069:34:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                 char val[tend - equal];
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3071:18:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
                 strncat(val, &equal[1], tend - equal -1);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3071:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                 strncat(val, &equal[1], tend - equal -1);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3365:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   else len = strlen(start);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:3768:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t len = strlen(temp);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:4418:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             size_t len = strlen(format);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:7109:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  fstr_len = strlen(fstr);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:8656:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return _escaped_char_get(escape, escape + strlen(escape));
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:8925:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 text_len = strlen(_REPLACEMENT_CHAR_UTF8)) ||
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:8927:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 text_len = strlen(_NEWLINE_UTF8)) ||
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:8929:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 text_len = strlen(_TAB_UTF8)) ||
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:8931:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 text_len = strlen(_PARAGRAPH_SEPARATOR_UTF8)))
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:9945:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             fstr_len = strlen(fstr);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:10901:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             fstr_len = strlen(fstr);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:11863:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        format_len = strlen(format);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:11883:24:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                       strncpy(tmp, format, format_len);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:11941:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = strlen(tmp);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:12705:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   stripped_len = strlen(fmt->orig_format);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:12729:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(tmp, stripped, stripped_len);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:14513:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(shorttext, text, 38);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:16267:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(format);
data/efl-1.25.1/src/lib/evas/canvas/evas_object_textblock.c:16276:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(format);
data/efl-1.25.1/src/lib/evas/common/evas_image_load.c:283:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(eina_file_filename_get(ie->f));
data/efl-1.25.1/src/lib/evas/common/evas_image_load.c:299:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(ie->file);
data/efl-1.25.1/src/lib/evas/common/evas_image_load.c:306:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len2 = strlen(loaders[i].extension);
data/efl-1.25.1/src/lib/evas/common/evas_image_main.c:850:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (ie->cache_key) size += strlen(ie->cache_key);
data/efl-1.25.1/src/lib/evas/common/evas_image_main.c:851:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (ie->file) size += strlen(ie->file);
data/efl-1.25.1/src/lib/evas/common/evas_image_main.c:852:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (ie->key) size += strlen(ie->key);
data/efl-1.25.1/src/lib/evas/common/evas_image_scalecache.c:543:14:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
             usleep(slp);
data/efl-1.25.1/src/lib/evas/common/evas_text_utils.c:22:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define COLOR_NAME(name,r,g,b) {name,(unsigned char)strlen(name),r,g,b}
data/efl-1.25.1/src/lib/evas/common/language/evas_language_utils.c:152:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(lang, locale, size - 1);
data/efl-1.25.1/src/lib/evas/common/language/evas_language_utils.c:192:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(lang_full, locale, i);
data/efl-1.25.1/src/lib/evas/file/evas_module.c:145:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path = malloc(strlen(libdir) + strlen("/evas/modules") + 1);
data/efl-1.25.1/src/lib/evas/file/evas_module.c:145:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path = malloc(strlen(libdir) + strlen("/evas/modules") + 1);
data/efl-1.25.1/src/lib/evas/file/evas_path.c:53:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(path);
data/efl-1.25.1/src/lib/evas/file/evas_path.c:54:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len += strlen(end);
data/efl-1.25.1/src/lib/evas/file/evas_path.c:55:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len += strlen(EVAS_PATH_SEPARATOR);
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:2795:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       char *buf = alloca(strlen(db->name) + strlen(db->value) + 4);
data/efl-1.25.1/src/lib/evas/filters/evas_filter_parser.c:2795:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       char *buf = alloca(strlen(db->name) + strlen(db->value) + 4);
data/efl-1.25.1/src/lib/evas/vg/evas_vg_cache.c:55:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(file);
data/efl-1.25.1/src/lib/evas/vg/evas_vg_cache.c:121:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(file);
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:24:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   l1 = strlen(desc);
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:25:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   l2 = strlen(str);
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:60:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(path);
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:242:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(path);
data/efl-1.25.1/src/lib/evil/evil_dlfcn.c:318:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             length = strlen(name);
data/efl-1.25.1/src/lib/evil/evil_stdlib.c:50:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = value ? strlen(value) : 0;
data/efl-1.25.1/src/lib/evil/evil_stdlib.c:51:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length += strlen(name) + 2;
data/efl-1.25.1/src/lib/evil/evil_stdlib.c:83:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   *length = strlen(__template);
data/efl-1.25.1/src/lib/evil/evil_string.c:26:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length_needle = strlen(needle);
data/efl-1.25.1/src/lib/evil/evil_string.c:27:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length_haystack = strlen(haystack);
data/efl-1.25.1/src/lib/evil/evil_time.c:136:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(*n1);
data/efl-1.25.1/src/lib/evil/evil_util.c:27:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   wsize = MultiByteToWideChar(CP_ACP, 0, text, (int)strlen(text) + 1, NULL, 0);
data/efl-1.25.1/src/lib/evil/evil_util.c:38:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (!MultiByteToWideChar(CP_ACP, 0, text, (int)strlen(text) + 1, wtext, wsize))
data/efl-1.25.1/src/lib/evil/evil_util.c:202:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(path);
data/efl-1.25.1/src/modules/ecore_evas/engines/cocoa/ecore_evas_cocoa.c:443:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp("text/", mime_type, strlen("text/")))
data/efl-1.25.1/src/modules/ecore_evas/engines/cocoa/ecore_evas_cocoa.c:506:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp("text/", mime_type, strlen("text/")))
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:629:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (ev->key) len += strlen(ev->key) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:630:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (ev->keyname) len += strlen(ev->keyname) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:631:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (ev->string) len += strlen(ev->string) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:632:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (ev->compose) len += strlen(ev->compose) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:642:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             p += strlen(p) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:648:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             p += strlen(p) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:654:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             p += strlen(p) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:660:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             p += strlen(p) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:686:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (ev->key) len += strlen(ev->key) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:687:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (ev->keyname) len += strlen(ev->keyname) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:688:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (ev->string) len += strlen(ev->string) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:689:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (ev->compose) len += strlen(ev->compose) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:699:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             p += strlen(p) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:705:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             p += strlen(p) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:711:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             p += strlen(p) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:717:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             p += strlen(p) + 1;
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:826:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                0, 0, 0, profile, strlen(profile) + 1);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:1454:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             strlen(extn->svc.name) + 1);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:1458:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             lock, strlen(lock) + 1);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:1492:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (s) len = strlen(s);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:1607:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              strlen(extn->svc.name) + 1);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:1611:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              lock, strlen(lock) + 1);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:1962:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        strlen(extn->svc.name) + 1);
data/efl-1.25.1/src/modules/ecore_evas/engines/extn/ecore_evas_extn.c:1966:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        lock, strlen(lock) + 1);
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:3695:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ECORE_X_ATOM_STRING, 8, (void *)hints, strlen(hints) + 1);
data/efl-1.25.1/src/modules/ecore_evas/engines/x/ecore_evas_x.c:3912:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        result = _create_delivery_content(strlen(file), file, mime_type);
data/efl-1.25.1/src/modules/ecore_evas/vnc_server/ecore_evas_vnc_server.c:370:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e = calloc(1, sizeof(Ecore_Event_Key) + (compose ? 0 : strlen(buf) + 1));
data/efl-1.25.1/src/modules/ecore_imf/ibus/ibus_imcontext.c:847:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        preedit_length = strlen(ibusimcontext->preedit_string);
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:369:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((strlen(str) - 11 + 1) > sizeof(key_string))
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:381:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((strlen(str) + 1) > sizeof(key_string))
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:582:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     context_scim->impl->is_on = _config->read(String(SCIM_CONFIG_FRONTEND_IM_OPENED_BY_DEFAULT), context_scim->impl->is_on);
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:796:51:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
             context_scim->impl->is_on = _config->read(String(SCIM_CONFIG_FRONTEND_IM_OPENED_BY_DEFAULT), context_scim->impl->is_on);
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:2801:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      config->read(String(SCIM_CONFIG_HOTKEYS_FRONTEND_VALID_KEY_MASK),
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:2809:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   _on_the_spot = config->read(String(SCIM_CONFIG_FRONTEND_ON_THE_SPOT), _on_the_spot);
data/efl-1.25.1/src/modules/ecore_imf/scim/scim_imcontext.cpp:2810:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   _shared_input_method = config->read(String(SCIM_CONFIG_FRONTEND_SHARED_INPUT_METHOD), _shared_input_method);
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:292:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     imcontext->preedit_text && strlen(imcontext->preedit_text) > 0;
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:440:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     imcontext->preedit_text && strlen(imcontext->preedit_text) > 0;
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:463:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (imcontext->preedit_text && strlen(imcontext->preedit_text) == 0)
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:559:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p += strlen(p) + 1;
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:613:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e = calloc(1, sizeof(Ecore_Event_Key) + strlen(key) + strlen(keyname) +
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:613:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e = calloc(1, sizeof(Ecore_Event_Key) + strlen(key) + strlen(keyname) +
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:614:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              strlen(string) + 3);
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:618:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e->key = e->keyname + strlen(keyname) + 1;
data/efl-1.25.1/src/modules/ecore_imf/wayland/wayland_imcontext.c:619:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   e->string = e->key + strlen(key) + 1;
data/efl-1.25.1/src/modules/eina/mp/chained_pool/eina_chained_mempool.c:689:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = context ? strlen(context) + 1 : 0;
data/efl-1.25.1/src/modules/eina/mp/one_big/eina_one_big.c:356:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = context ? strlen(context) + 1 : 0;
data/efl-1.25.1/src/modules/elementary/access_output/mod.c:77:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        cur_umask = umask(S_IRWXO | S_IRWXG);
data/efl-1.25.1/src/modules/elementary/access_output/mod.c:79:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        umask(cur_umask);
data/efl-1.25.1/src/modules/elementary/access_output/mod.c:83:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (write(tmpfd, txt, strlen(txt)) < 0) perror("write to tmpfile (espeak)");
data/efl-1.25.1/src/modules/elementary/prefs/elm_entry.c:69:51:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if (regexec(regex, val, 0, NULL, 0)) goto mismatch;
data/efl-1.25.1/src/modules/elementary/prefs/elm_entry.c:76:52:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if (!regexec(regex, val, 0, NULL, 0)) goto mismatch;
data/efl-1.25.1/src/modules/elementary/prefs/elm_entry.c:82:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(val) < min) goto mismatch;
data/efl-1.25.1/src/modules/elementary/prefs/elm_entry.c:82:37:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if (strlen(val) < min) goto mismatch;
data/efl-1.25.1/src/modules/elementary/prefs/elm_entry.c:87:1:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
mismatch:
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:361:14:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
             sscanf(label, "%30[^x]x%30[^-]-%30[^-]-%30s", f1, f2, f3, f4);
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:405:29:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                       if ((sscanf(line, " hsync %15s", value) == 1) &&
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:408:29:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                       if ((sscanf(line, " vsync %15s", value) == 1) &&
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:411:29:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                       if ((sscanf(line, " csync %15s", value) == 1) &&
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:414:29:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                       if ((sscanf(line, " extsync %15s", value) == 1) &&
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:417:29:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                       if ((sscanf(line, " laced %15s", value) == 1) &&
data/efl-1.25.1/src/modules/evas/engines/fb/evas_fb_main.c:420:29:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                       if ((sscanf(line, " double %15s",value) == 1) &&
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:2132:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!length) length = strlen(source);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:2170:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             int new_len = strlen(p);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:2220:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                len = string[i] ? strlen(string[i]) : 0;
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_api.c:2222:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           len = string[i] ? strlen(string[i]) : 0;
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_context.c:102:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(ext);
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:789:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (eet_write(ef, "num_fbo_fmts", data, strlen(data) + 1, 1) < 0)
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_core.c:806:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (eet_write(ef, tag, data, strlen(data) + 1, 1) < 0) return 0;
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:251:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          eina_hash_superfast(fragment_glsl, strlen(fragment_glsl)),
data/efl-1.25.1/src/modules/evas/engines/gl_common/evas_gl_shader.c:252:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          eina_hash_superfast(vertex_glsl, strlen(vertex_glsl)));
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:192:65:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
evas_eglMakeCurrent(EGLDisplay dpy, EGLSurface draw, EGLSurface read, EGLContext ctx)
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:202:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ret = eglMakeCurrent(dpy, draw, read, ctx);
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:207:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
             main_read = read;
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:213:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     return eglMakeCurrent(dpy, draw, read, ctx);
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1504:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sz = strlen(str);
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1507:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (str2) sz += 1 + strlen(str2);
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.c:1512:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
             strcat(tmpstr, " ");
data/efl-1.25.1/src/modules/evas/engines/gl_x11/evas_engine.h:221:76:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
EGLBoolean evas_eglMakeCurrent(EGLDisplay dpy, EGLSurface draw, EGLSurface read, EGLContext ctx);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:5494:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (!length) length = strlen(source);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:5531:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             int new_len = strlen(p);
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:5594:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                len = string[i] ? strlen(string[i]) : 0;
data/efl-1.25.1/src/modules/evas/engines/software_generic/evas_engine.c:5597:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           len = string[i] ? strlen(string[i]) : 0;
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:99:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int len = strlen(dest);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:129:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cmd_len = strlen(libdir);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:130:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cmd_len += strlen(loader);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:137:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   cmd_len += strlen(eina_file_filename_get(ef)) * 2; // double in case of esc
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:138:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (key) cmd_len += strlen(key) * 2; // double in case every char is esc
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:141:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(eina_file_filename_get(ef));
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:159:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(&(decoders[decoders_num][0]), img_loader, 4000);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:167:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(&(decoders[decoders_num][0]), img_loader, 4000);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:172:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(decoders[decoders_num], img_loader, 4000);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:181:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(&(decoders[decoders_num][0]), img_loader, 4000);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:186:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(decoders[decoders_num], img_loader, 4000);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:192:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(decoders[decoders_num], img_loader, 4000);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:207:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(cmd, " ");
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:209:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(cmd);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:221:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             len = strlen(cmd);
data/efl-1.25.1/src/modules/evas/image_loaders/generic/evas_image_load_generic.c:254:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/efl-1.25.1/src/modules/evas/image_loaders/png/evas_image_load_png.c:244:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (filename) filename_len = strlen(filename);
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1618:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(color) - 1;
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1851:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            len = strlen(line);
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1852:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                            strncpy(cmap[j].str, line, cpp);
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1869:39:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                                      strncpy(s, &line[k], slen);
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1881:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                     if (strlen(col) < (sizeof(col) - 2))
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1882:56:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                                                       strcat(col, " ");
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1885:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                if ((strlen(col) + strlen(s)) < (sizeof(col) - 1))
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1885:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                if ((strlen(col) + strlen(s)) < (sizeof(col) - 1))
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1918:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                if (strlen(col) < ( sizeof(col) - 2))
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1919:51:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                                                  strcat(col, " ");
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1922:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                           if ((strlen(col) + strlen(s)) < (sizeof(col) - 1))
data/efl-1.25.1/src/modules/evas/image_loaders/xpm/evas_image_load_xpm.c:1922:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                           if ((strlen(col) + strlen(s)) < (sizeof(col) - 1))
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:511:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   unsigned int i, len = strlen(str);
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:645:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   char *end = str + strlen(str);
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:753:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int sz = strlen(str);
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:970:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   sz = strlen(key);
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1182:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int sz = strlen(key);
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1244:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int sz = strlen(key);
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1403:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int sz = strlen(key);
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1477:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int sz = strlen(key);
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1753:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     int sz = strlen(name);                                             \
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:1891:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int sz = strlen(key);
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:2064:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int sz = strlen(key);
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:2144:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int sz = strlen(name);
data/efl-1.25.1/src/modules/evas/vg_loaders/svg/evas_vg_load_svg.c:2192:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(tag_name, content, sz);
data/efl-1.25.1/src/static_libs/freetype/sw_ft_stroker.c:781:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ( *read & SW_FT_STROKE_TAG_ON )
data/efl-1.25.1/src/static_libs/freetype/sw_ft_stroker.c:783:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        else if ( *read & SW_FT_STROKE_TAG_CUBIC )
data/efl-1.25.1/src/static_libs/http-parser/contrib/url_parser.c:32:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen(argv[2]);
data/efl-1.25.1/src/static_libs/http-parser/test.c:1969:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (http_parser_parse_url(m->request_url, strlen(m->request_url), 0, &u)) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:2051:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    off += strlen(m->raw);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2054:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      off -= strlen(m->upgrade);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2063:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      *(body + nread + strlen(m->upgrade)) = '\0';
data/efl-1.25.1/src/static_libs/http-parser/test.c:2084:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t i, j, len = strlen(raw), error_location_line = 0;
data/efl-1.25.1/src/static_libs/http-parser/test.c:2656:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                               strlen(test->url),
data/efl-1.25.1/src/static_libs/http-parser/test.c:2699:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t raw_len = strlen(message->raw);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2704:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    size_t read;
data/efl-1.25.1/src/static_libs/http-parser/test.c:2713:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        messages[num_messages - 1].upgrade = msg1 + read;
data/efl-1.25.1/src/static_libs/http-parser/test.c:2717:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read != msg1len) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:2718:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        print_error(msg1, read);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2727:51:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      messages[num_messages - 1].upgrade = msg2 + read;
data/efl-1.25.1/src/static_libs/http-parser/test.c:2731:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read != msg2len) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:2732:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      print_error(msg2, read);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2738:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read != 0) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:2739:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      print_error(message->raw, read);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2761:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t read;
data/efl-1.25.1/src/static_libs/http-parser/test.c:2762:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(message->raw);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2769:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read != toread) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:2770:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      print_error(message->raw, read);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2777:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read != 0) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:2778:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    print_error(message->raw, read);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2801:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  parsed = parse(buf, strlen(buf));
data/efl-1.25.1/src/static_libs/http-parser/test.c:2802:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pass = (parsed == strlen(buf));
data/efl-1.25.1/src/static_libs/http-parser/test.c:2831:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  parsed = http_parser_execute(&parser, &settings_null, buf, strlen(buf));
data/efl-1.25.1/src/static_libs/http-parser/test.c:2832:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(parsed == strlen(buf));
data/efl-1.25.1/src/static_libs/http-parser/test.c:2835:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t buflen = strlen(buf);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2936:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char total[ strlen(r1->raw)
data/efl-1.25.1/src/static_libs/http-parser/test.c:2937:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            + strlen(r2->raw)
data/efl-1.25.1/src/static_libs/http-parser/test.c:2938:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            + strlen(r3->raw)
data/efl-1.25.1/src/static_libs/http-parser/test.c:2949:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t read;
data/efl-1.25.1/src/static_libs/http-parser/test.c:2951:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  read = parse(total, strlen(total));
data/efl-1.25.1/src/static_libs/http-parser/test.c:2954:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    upgrade_message_fix(total, read, 3, r1, r2, r3);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2958:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read != strlen(total)) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:2958:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (read != strlen(total)) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:2959:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    print_error(total, read);
data/efl-1.25.1/src/static_libs/http-parser/test.c:2965:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read != 0) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:2966:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    print_error(total, read);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3000:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t read;
data/efl-1.25.1/src/static_libs/http-parser/test.c:3002:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int total_len = strlen(total);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3039:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read != buf1_len) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:3040:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          print_error(buf1, read);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3048:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read != buf1_len + buf2_len) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:3049:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          print_error(buf2, read);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3057:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read != buf1_len + buf2_len + buf3_len) {
data/efl-1.25.1/src/static_libs/http-parser/test.c:3058:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          print_error(buf3, read);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3066:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          upgrade_message_fix(total, read, 3, r1, r2, r3);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3112:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t headers_len = strlen(headers);
data/efl-1.25.1/src/static_libs/http-parser/test.c:3145:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  http_parser_execute(parser, &settings, response, strlen(response));
data/efl-1.25.1/src/static_libs/http-parser/test.c:3156:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t buflen = strlen(msg->raw);
data/efl-1.25.1/src/static_libs/libdrm/intel_bufmgr.h:313:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define dri_bo_emit_reloc(reloc_bo, read, write, target_offset,		\
data/efl-1.25.1/src/static_libs/libdrm/intel_bufmgr.h:317:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				read, write);
data/efl-1.25.1/src/static_libs/libunibreak/linebreak.c:320:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_audio.c:453:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t read;
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_audio.c:519:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  fail_if(read != 0);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_audio.c:528:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  fail_if(read != 10);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:210:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(ret != strlen(random_text)+1);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:400:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   path = malloc(strlen(src_dir) + strlen(dup_dir) + 2);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:400:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   path = malloc(strlen(src_dir) + strlen(dup_dir) + 2);
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:401:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   snprintf(path, strlen(src_dir) + strlen(dup_dir) + 2, "%s:%s", src_dir, dirname(dup_dir));
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_file.c:401:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   snprintf(path, strlen(src_dir) + strlen(dup_dir) + 2, "%s:%s", src_dir, dirname(dup_dir));
data/efl-1.25.1/src/tests/ecore/ecore_test_ecore_thread_eina_thread_queue.c:664:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read(p[0], &buf, 1) != 1)
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con.c:508:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strncmp(canonname,(char *)data, strlen((char *)data)));
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con_eet.c:77:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          strlen(toSend) + 1);
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_ecore_con_eet.c:91:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            strlen(rawMsg) + 1);
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:264:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf),
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:264:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf),
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:683:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   buf[strlen(buf)] = ']';
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:687:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf),
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:687:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf),
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:998:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (line->length < strlen("::1 localhost")) continue;
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:1005:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((size_t)(line->end - p) < strlen("::1 localhost")) continue;
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:1006:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (memcmp(p, "::1", strlen("::1")) != 0) continue;
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:1008:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p += strlen("::1");
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:1036:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if ((len == strlen(localhost)) && (memcmp(p, localhost, strlen(localhost)) == 0))
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:1036:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if ((len == strlen(localhost)) && (memcmp(p, localhost, strlen(localhost)) == 0))
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:1038:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  else if ((len == strlen(localhost6)) && (memcmp(p, localhost6, strlen(localhost6)) == 0))
data/efl-1.25.1/src/tests/ecore_con/ecore_con_test_efl_net_ip_address.c:1038:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  else if ((len == strlen(localhost6)) && (memcmp(p, localhost6, strlen(localhost6)) == 0))
data/efl-1.25.1/src/tests/eet/eet_suite.c:51:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memcpy(argv0, argv[0], strlen(argv[0]) + 1);
data/efl-1.25.1/src/tests/eet/eet_test_cache.c:74:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(!eet_write(ef, "keys/tests", buffer, strlen(buffer) + 1, 0));
data/efl-1.25.1/src/tests/eet/eet_test_cipher.c:33:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(!eet_write_cipher(ef, "keys/tests", buffer, strlen(buffer) + 1, 0,
data/efl-1.25.1/src/tests/eet/eet_test_cipher.c:44:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(size != (int)strlen(buffer) + 1);
data/efl-1.25.1/src/tests/eet/eet_test_cipher.c:46:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(memcmp(test, buffer, strlen(buffer) + 1) != 0);
data/efl-1.25.1/src/tests/eet/eet_test_cipher.c:56:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (size == (int)strlen(buffer) + 1)
data/efl-1.25.1/src/tests/eet/eet_test_cipher.c:57:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     fail_if(memcmp(test, buffer, strlen(buffer) + 1) == 0);
data/efl-1.25.1/src/tests/eet/eet_test_common.c:28:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = *string ? strlen(*string) : 0;
data/efl-1.25.1/src/tests/eet/eet_test_common.c:29:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   *string = realloc(*string, strlen(str) + length + 1);
data/efl-1.25.1/src/tests/eet/eet_test_common.c:33:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memcpy((*string) + length, str, strlen(str) + 1);
data/efl-1.25.1/src/tests/eet/eet_test_data.c:428:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   transfert2 = eet_data_text_undump(string1, string1 ? strlen(
data/efl-1.25.1/src/tests/eet/eet_test_data.c:436:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(string2) != strlen(string1));
data/efl-1.25.1/src/tests/eet/eet_test_data.c:436:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(string2) != strlen(string1));
data/efl-1.25.1/src/tests/eet/eet_test_data.c:480:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   blob = eet_data_text_undump(inputstr, strlen(inputstr), &blob_len);
data/efl-1.25.1/src/tests/eet/eet_test_file.c:37:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(!eet_write(ef, "keys/tests", buffer, strlen(buffer) + 1, 1));
data/efl-1.25.1/src/tests/eet/eet_test_file.c:60:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(size != (int)strlen(buffer) + 1);
data/efl-1.25.1/src/tests/eet/eet_test_file.c:62:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(memcmp(test, buffer, strlen(buffer) + 1) != 0);
data/efl-1.25.1/src/tests/eet/eet_test_file.c:66:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(size != (int)strlen(buffer) + 1);
data/efl-1.25.1/src/tests/eet/eet_test_file.c:91:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(size != (int)strlen(buffer) + 1);
data/efl-1.25.1/src/tests/eet/eet_test_file.c:93:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(memcmp(test, buffer, strlen(buffer) + 1) != 0);
data/efl-1.25.1/src/tests/eet/eet_test_file.c:98:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(size != (int)strlen(buffer) + 1);
data/efl-1.25.1/src/tests/eet/eet_test_file.c:113:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(size != (int)strlen(buffer) + 1);
data/efl-1.25.1/src/tests/eet/eet_test_file.c:115:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(memcmp(test, buffer, strlen(buffer) + 1) != 0);
data/efl-1.25.1/src/tests/eet/eet_test_file.c:339:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(!eet_data_undump(ef, EET_TEST_FILE_KEY1, string1, strlen(string1), 1));
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:33:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((int)strlen("password") > size)
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:37:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return strlen(pass);
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:48:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((int)strlen("bad password") > size)
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:52:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return strlen(pass);
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:77:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(!eet_write(ef, "keys/tests", buffer, strlen(buffer) + 1, 0));
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:96:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(size != (int)strlen(buffer) + 1);
data/efl-1.25.1/src/tests/eet/eet_test_identity.c:98:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(memcmp(test, buffer, strlen(buffer) + 1) != 0);
data/efl-1.25.1/src/tests/eet_cxx/eet_cxx_test_descriptors.cc:105:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    auto v = efl::eet::read(file, "non_pod", d);
data/efl-1.25.1/src/tests/eet_cxx/eet_cxx_test_descriptors.cc:170:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    auto v = efl::eet::read(file, "foo", d);
data/efl-1.25.1/src/tests/eet_cxx/eet_cxx_test_descriptors.cc:198:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    auto v = efl::eet::read(file, "foo", d);
data/efl-1.25.1/src/tests/eet_cxx/eet_cxx_test_descriptors.cc:232:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    auto v = efl::eet::read(file, "foo", d);
data/efl-1.25.1/src/tests/efl_mono/dummy_child.c:57:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pd->a = malloc(sizeof(char)*(strlen(a) + 1));
data/efl-1.25.1/src/tests/efl_mono/dummy_test_object.c:172:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char *ret = malloc(sizeof(char)*(strlen(str) + 1));
data/efl-1.25.1/src/tests/efl_mono/dummy_test_object.c:178:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *ret = malloc(sizeof(char)*(strlen(str) + 1));
data/efl-1.25.1/src/tests/efl_mono/dummy_test_object.c:204:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char *ret = malloc(sizeof(char)*(strlen(reference) + 1));
data/efl-1.25.1/src/tests/efl_mono/dummy_test_object.c:216:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *str = malloc(sizeof(char)*(strlen(reference) + 1));
data/efl-1.25.1/src/tests/efl_mono/dummy_test_object.c:4206:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int len = strlen(str);
data/efl-1.25.1/src/tests/efreet/ef_data_dirs.c:186:20:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        if (i > 0) strcat(dirs, ":");
data/efl-1.25.1/src/tests/efreet/ef_data_dirs.c:274:20:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        if (i > 0) strcat(dirs, ":");
data/efl-1.25.1/src/tests/efreet/ef_ini.c:142:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  len = strlen(val);
data/efl-1.25.1/src/tests/eina/eina_test_abstract_content.c:17:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ck_assert_int_eq(eina_content_data_get(content).len, strlen(text_str) + 1);
data/efl-1.25.1/src/tests/eina/eina_test_abstract_content.c:165:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ck_assert_int_eq(slice.len, strlen(str_a) + 1);
data/efl-1.25.1/src/tests/eina/eina_test_abstract_content.c:183:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ck_assert_int_eq(slice.len, strlen(str_a) + 1);
data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c:179:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_binbuf_string_get(buf)) != eina_binbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c:183:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_binbuf_string_get(buf)) != eina_binbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c:187:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_binbuf_string_get(buf)) != eina_binbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c:191:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_binbuf_string_get(buf)) != eina_binbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c:195:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_binbuf_string_get(buf)) != eina_binbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c:199:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_binbuf_string_get(buf)) != eina_binbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c:203:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_binbuf_string_get(buf)) != eina_binbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c:207:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   fail_if(strlen(eina_binbuf_string_get(
data/efl-1.25.1/src/tests/eina/eina_test_binbuf.c:211:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen("089\\ \\'\\\\")));
data/efl-1.25.1/src/tests/eina/eina_test_binshare.c:124:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(build);
data/efl-1.25.1/src/tests/eina/eina_test_binshare.c:148:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buffer);
data/efl-1.25.1/src/tests/eina/eina_test_convert.c:55:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(eina_convert_itoa(INT_MIN, tmp) != (int) strlen(ref));
data/efl-1.25.1/src/tests/eina/eina_test_crc.c:38:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret = eina_crc(data[i], strlen(data[i]), seed, EINA_TRUE);
data/efl-1.25.1/src/tests/eina/eina_test_crc.c:42:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ret = eina_crc(s1, strlen(s1), 0xffffffff, EINA_TRUE);
data/efl-1.25.1/src/tests/eina/eina_test_crc.c:43:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ret = eina_crc(s2, strlen(s2), ret, EINA_FALSE);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:306:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int template_size = strlen(template);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:310:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int test_string_length = strlen(eina_map_test_string);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:316:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int test_file_name_part_size = strlen(test_file_name_part);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:317:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int test_file2_name_part_size = strlen(test_file2_name_part);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:324:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   test_dirname_size = strlen((char *)test_dirname);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:344:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size = strlen(template);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:350:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if((int)strlen(big_buffer) != (big_buffer_size - file_min_offset));
data/efl-1.25.1/src/tests/eina/eina_test_file.c:361:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(write(fd, eina_map_test_string, strlen(eina_map_test_string)) != (ssize_t) strlen(eina_map_test_string));
data/efl-1.25.1/src/tests/eina/eina_test_file.c:361:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(write(fd, eina_map_test_string, strlen(eina_map_test_string)) != (ssize_t) strlen(eina_map_test_string));
data/efl-1.25.1/src/tests/eina/eina_test_file.c:455:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   f = eina_file_virtualize("gloubi", virtual_file_data, strlen(virtual_file_data), EINA_FALSE);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:499:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(filename);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:515:4:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
   strncat(filename, test_file, MAX_PATH - len - 2);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:605:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret = eina_xattr_set(test_file_path, attribute[i], data[i], strlen(data[i]), EINA_XATTR_INSERT);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:665:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(write(fd1, data, strlen(data)) != (ssize_t) strlen(data));
data/efl-1.25.1/src/tests/eina/eina_test_file.c:665:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(write(fd1, data, strlen(data)) != (ssize_t) strlen(data));
data/efl-1.25.1/src/tests/eina/eina_test_file.c:685:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(file1_len != strlen(data));
data/efl-1.25.1/src/tests/eina/eina_test_file.c:695:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   rval = memcmp(content1, content2, strlen(data));
data/efl-1.25.1/src/tests/eina/eina_test_file.c:717:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int template_size = strlen(template);
data/efl-1.25.1/src/tests/eina/eina_test_file.c:860:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int data_size = strlen(data);
data/efl-1.25.1/src/tests/eina/eina_test_hash.c:40:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return (int)strlen(key) + 1;
data/efl-1.25.1/src/tests/eina/eina_test_hash.c:63:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(key) <= 0)
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:105:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const int sz = strlen(buf);
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:143:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp("gpx ", content, strlen("gpx ")))
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:148:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp("metadata>", content, strlen("metadata>")))
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:153:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp("link ", content, strlen("link ")))
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:158:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp("text>", content, strlen("text>")))
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:163:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp("time>", content, strlen("time>")))
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:168:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp("trk>", content, strlen("trk>")))
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:173:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp("name>", content, strlen("name>")))
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:178:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (!strncmp("trkseg>", content, strlen("trkseg>")))
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:190:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp("trkpt ", content, strlen("trkpt ")))
data/efl-1.25.1/src/tests/eina/eina_test_simple_xml_parser.c:209:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp("gpx", content, strlen("gpx")))
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:43:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_unless(c.len == strlen("hi there"));
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:71:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   a = eina_slice_seek(slice, strlen("hi "), SEEK_SET);
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:72:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_unless(a.mem == slice.bytes + strlen("hi "));
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:73:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_unless(a.len == slice.len - strlen("hi "));
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:91:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   slice.len = strlen("hi there"); /* crop... */
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:163:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   a = eina_rw_slice_seek(rw_slice, strlen("hi "), SEEK_SET);
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:164:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_unless(a.mem == rw_slice.bytes + strlen("hi "));
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:165:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_unless(a.len == rw_slice.len - strlen("hi "));
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:236:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   Eina_Slice slice = {.len = strlen("Hello"), .mem = buf};
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:267:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ck_assert_str_eq(p, (const char *)slice.bytes + strlen("abcde"));
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:271:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ck_assert_str_eq(p, (const char *)slice.bytes + strlen("abcd"));
data/efl-1.25.1/src/tests/eina/eina_test_slice.c:275:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ck_assert_str_eq(p, (const char *)slice.bytes + strlen("abc"));
data/efl-1.25.1/src/tests/eina/eina_test_slstr.c:195:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   for (i = 0; i < strlen(STRL); i++)
data/efl-1.25.1/src/tests/eina/eina_test_str.c:90:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(eina_strlen_bounded("abc", 4) != strlen("abc"));
data/efl-1.25.1/src/tests/eina/eina_test_str.c:104:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(ret) != strlen(escape_ret));
data/efl-1.25.1/src/tests/eina/eina_test_str.c:104:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(ret) != strlen(escape_ret));
data/efl-1.25.1/src/tests/eina/eina_test_str.c:105:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   for (i = 0; i <= strlen(ret); i++)
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:43:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:46:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:48:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:54:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:56:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:92:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:95:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:97:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:103:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:105:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:111:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   buf = eina_strbuf_manage_read_only_new_length(TEST_TEXT, strlen(TEST_TEXT));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:115:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:118:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:120:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:136:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:138:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:141:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:144:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:147:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:150:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:153:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:159:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:173:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ro_slice.len -= strlen("ELSE");
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:179:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:184:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:189:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:194:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:199:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:203:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   eina_strbuf_append_length(buf, "something", strlen("something"));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:204:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:209:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:228:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:232:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:236:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:240:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:244:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:248:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:252:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:256:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:260:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen("089\\ \\'\\\\")));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:275:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:279:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:283:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:287:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:291:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:295:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:299:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:303:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:307:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_strbuf_string_get(buf)) != eina_strbuf_length_get(buf));
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:405:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   target_pattern_size = strlen(target_pattern);
data/efl-1.25.1/src/tests/eina/eina_test_strbuf.c:436:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   target_pattern_size = strlen(target_pattern);
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:50:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if((int)strlen(TEST0) != eina_stringshare_strlen(t0));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:51:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if((int)strlen(TEST1) != eina_stringshare_strlen(t1));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:55:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if((int)strlen(TEST0) != eina_stringshare_strlen(t0));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:59:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(slice.len != strlen(TEST0));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:80:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if((int)strlen(TEST0) != eina_stringshare_strlen(t0));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:81:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if((int)strlen(TEST1) != eina_stringshare_strlen(t1));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:85:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if((int)strlen(TEST0) != eina_stringshare_strlen(t0));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:89:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(slice.len != strlen(TEST0));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:122:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fail_if((int)strlen(buf) != eina_stringshare_strlen(t0));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:123:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fail_if((int)strlen(buf) != eina_stringshare_strlen(t1));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:147:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if((int)strlen(t0) != eina_stringshare_strlen(t0));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:222:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_stringshare_printf("%s", "")) > 0);
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:224:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(strlen(eina_stringshare_nprintf(0, "%s", "")) > 0);
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:235:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(((int)strlen(TEST1) + 2) != eina_stringshare_strlen(t1));
data/efl-1.25.1/src/tests/eina/eina_test_stringshare.c:236:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(((int)strlen(TEST1) + 2) != eina_stringshare_strlen(t2));
data/efl-1.25.1/src/tests/eina/eina_test_tmpstr.c:129:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ck_assert_int_eq(eina_tmpstr_len(tstr1), strlen(str1));
data/efl-1.25.1/src/tests/eina/eina_test_tmpstr.c:130:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ck_assert_int_eq(eina_tmpstr_len(tstr2), strlen(str2));
data/efl-1.25.1/src/tests/eina/eina_test_ustringshare.c:53:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if((int)strlen((char*)TEST0) != eina_stringshare_strlen((const char*)t0));
data/efl-1.25.1/src/tests/eina/eina_test_xattr.c:58:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ret = eina_xattr_set(test_file_path, attribute1, data1, strlen(data1), EINA_XATTR_INSERT);
data/efl-1.25.1/src/tests/eina/eina_test_xattr.c:66:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ret = eina_xattr_set(test_file_path, attribute1, data1, strlen(data1), EINA_XATTR_CREATED);
data/efl-1.25.1/src/tests/eina/eina_test_xattr.c:69:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ret = eina_xattr_set(test_file_path, attribute1, data2, strlen(data2), EINA_XATTR_REPLACE);
data/efl-1.25.1/src/tests/eina/eina_test_xattr.c:80:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ret = eina_xattr_fd_set(fd, attribute1, data1, strlen(data1), EINA_XATTR_CREATED);
data/efl-1.25.1/src/tests/eina/eina_test_xattr.c:133:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret = eina_xattr_set(test_file_path, attribute[i], data[i], strlen(data[i]), EINA_XATTR_INSERT);
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:43:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:44:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:63:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:64:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:97:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:98:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:112:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(it, array3.end(), array.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:119:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(array.begin(), array.end(), array4.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:234:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:235:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:260:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:261:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:300:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:301:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:315:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(it, array3.end(), array.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:322:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), array4.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:420:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_array.begin(), range_array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:421:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_array.rbegin(), range_array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:431:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_array.begin(), range_array.end(), result1));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inarray.cc:432:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_array.rbegin(), range_array.rend(), rresult1));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:46:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:47:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:66:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:67:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:85:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:86:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:105:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:106:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:139:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:140:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:154:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(it, list3.end(), list.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:161:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(list.begin(), list.end(), list4.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:253:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_list.begin(), range_list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:254:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_list.rbegin(), range_list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:259:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_list.begin(), range_list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_inlist.cc:260:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_list.rbegin(), range_list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_iterator.cc:46:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(iterator, last_iterator, result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_iterator.cc:72:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(iterator, last_iterator, result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:63:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:64:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:74:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:75:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:88:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), result_));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:89:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.rbegin(), array.rend(), rresult_));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:111:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:112:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:123:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:124:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:142:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), result_));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:143:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.rbegin(), array.rend(), rresult_));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:196:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:197:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:212:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(it, array3.end(), array.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:219:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), array4.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:270:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:271:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.rbegin(), array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:285:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(it, array3.end(), array.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:292:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array.begin(), array.end(), array4.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:355:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array1.begin(), array1.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:356:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array1.rbegin(), array1.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:363:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array1.begin(), array1.end(), &result[1]));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:399:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array1.begin(), array1.end(), result_));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:400:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array1.rbegin(), array1.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:407:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(array1.begin(), array1.end(), &result_[1]));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:447:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(range_array.begin(), range_array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:448:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(range_array.rbegin(), range_array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:453:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(range_array.begin(), range_array.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrarray.cc:454:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(range_array.rbegin(), range_array.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:65:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:66:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:75:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:76:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:88:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result_));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:89:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult_));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:115:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:116:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:127:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:128:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:142:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result_));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:143:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult_));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:164:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:165:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:182:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:183:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:209:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:210:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:221:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:222:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:236:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result_));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:237:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult_));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:273:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:274:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:288:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(it, list3.end(), list.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:295:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), list4.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:329:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:330:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.rbegin(), list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:344:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(it, list3.end(), list.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:351:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    ck_assert(std::equal(list.begin(), list.end(), list4.begin()));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:487:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_list.begin(), range_list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:488:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_list.rbegin(), range_list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:493:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_list.begin(), range_list.end(), result));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_ptrlist.cc:494:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(range_list.rbegin(), range_list.rend(), rresult));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_stringshare.cc:57:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(string.begin(), string.end(), str));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_stringshare.cc:58:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(string.rbegin(), string.rend(), rstr));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_stringshare.cc:59:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(string.cbegin(), string.cend(), str));
data/efl-1.25.1/src/tests/eina_cxx/eina_cxx_test_stringshare.cc:60:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ck_assert(std::equal(string.crbegin(), string.crend(), rstr));
data/efl-1.25.1/src/tests/eio/eio_test_eet.c:47:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(size != strlen(str) + 1);
data/efl-1.25.1/src/tests/eio/eio_test_eet.c:48:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(memcmp(str, read_str, strlen(str) + 1) != 0);
data/efl-1.25.1/src/tests/eio/eio_test_eet.c:85:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ef = eio_eet_write_cipher(ee, "keys/tests", data, strlen(data) + 1, 0,
data/efl-1.25.1/src/tests/eio/eio_test_file.c:30:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (last_slash != NULL && strlen(last_slash) > 1 && last_slash[1] == '.')
data/efl-1.25.1/src/tests/eio/eio_test_file.c:58:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (last_slash != NULL && strlen(last_slash) > 1 && last_slash[1] == '.')
data/efl-1.25.1/src/tests/eio/eio_test_manager_xattr.c:147:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        buf = eina_binbuf_manage_new((const unsigned char*) attr_data[i], strlen(attr_data[i]), EINA_TRUE);
data/efl-1.25.1/src/tests/eio/eio_test_map.c:36:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t len = strlen(str);
data/efl-1.25.1/src/tests/eio/eio_test_map.c:66:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(write(fd, data, strlen(data)) != (ssize_t)strlen(data));
data/efl-1.25.1/src/tests/eio/eio_test_map.c:66:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fail_if(write(fd, data, strlen(data)) != (ssize_t)strlen(data));
data/efl-1.25.1/src/tests/eio/eio_test_map.c:78:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ef = eio_file_map_new(eie, EINA_FILE_WILLNEED, 0, strlen(data), _filter_cb,
data/efl-1.25.1/src/tests/eio/eio_test_xattr.c:150:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                attr_data[i], strlen(attr_data[i]),
data/efl-1.25.1/src/tests/elementary/efl_ui_suite.h:15:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(expected, s1, len);                 \
data/efl-1.25.1/src/tests/elementary/efl_ui_suite.h:17:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(actual, s2, len);                   \
data/efl-1.25.1/src/tests/elementary/elm_code_file_test_load.c:94:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(content);
data/efl-1.25.1/src/tests/elementary/elm_code_test_indent.c:17:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   elm_code_file_line_append(file, prev, strlen(prev), NULL);
data/efl-1.25.1/src/tests/elementary/elm_code_test_syntax.c:14:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(line);
data/efl-1.25.1/src/tests/elementary/elm_code_test_text.c:113:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ck_assert_int_eq(6, elm_code_text_newlinenpos(unixtext, strlen(unixtext), &nllen));
data/efl-1.25.1/src/tests/elementary/elm_code_test_text.c:115:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ck_assert_int_eq(9, elm_code_text_newlinenpos(wintext, strlen(wintext), &nllen));
data/efl-1.25.1/src/tests/elementary/elm_code_test_text.c:128:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ck_assert_int_eq(1, elm_code_text_is_whitespace(text, strlen(text)));
data/efl-1.25.1/src/tests/elementary/elm_code_test_text.c:131:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ck_assert_int_eq(1, elm_code_text_is_whitespace(text, strlen(text)));
data/efl-1.25.1/src/tests/elementary/elm_code_test_text.c:134:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ck_assert_int_eq(0, elm_code_text_is_whitespace(text, strlen(text)));
data/efl-1.25.1/src/tests/elementary/elm_suite.h:10:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(expected, s1, len);                 \
data/efl-1.25.1/src/tests/elementary/elm_suite.h:12:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(actual, s2, len);                   \
data/efl-1.25.1/src/tests/elementary/suite_helpers.c:824:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (unsigned int i = 0; i < strlen(seqence); ++i)
data/efl-1.25.1/src/tests/evas/evas_test_image.c:75:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (!strcasecmp(file->path + file->path_length - strlen(exts[i]),
data/efl-1.25.1/src/tests/evas/evas_test_textblock.c:2466:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(substr);
data/efl-1.25.1/src/tests/evil/evil_test_stdio.c:39:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (fwrite(t, 1, strlen(t), f) != strlen(t))
data/efl-1.25.1/src/tests/evil/evil_test_stdio.c:39:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (fwrite(t, 1, strlen(t), f) != strlen(t))
data/efl-1.25.1/src/tests/evil/evil_test_stdio.c:59:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (fwrite(t, 1, strlen(t), f) != strlen(t))
data/efl-1.25.1/src/tests/evil/evil_test_stdio.c:59:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (fwrite(t, 1, strlen(t), f) != strlen(t))

ANALYSIS SUMMARY:

Hits = 6939
Lines analyzed = 1547425 in approximately 38.47 seconds (40229 lines/second)
Physical Source Lines of Code (SLOC) = 1098684
Hits@level = [0] 6755 [1] 2098 [2] 3541 [3] 588 [4] 699 [5]  13
Hits@level+ = [0+] 13694 [1+] 6939 [2+] 4841 [3+] 1300 [4+] 712 [5+]  13
Hits/KSLOC@level+ = [0+] 12.464 [1+] 6.31574 [2+] 4.40618 [3+] 1.18323 [4+] 0.648048 [5+] 0.0118323
Dot directories skipped = 2 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.