Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/libccp4-6.5.1/ccp4/cmap_stats.h
Examining data/libccp4-6.5.1/ccp4/ccp4_vars.h
Examining data/libccp4-6.5.1/ccp4/overview.h
Examining data/libccp4-6.5.1/ccp4/cmap_symop.c
Examining data/libccp4-6.5.1/ccp4/cmap_accessor.c
Examining data/libccp4-6.5.1/ccp4/mtzdata.h
Examining data/libccp4-6.5.1/ccp4/library_file.h
Examining data/libccp4-6.5.1/ccp4/cmap_header.h
Examining data/libccp4-6.5.1/ccp4/cmaplib.h
Examining data/libccp4-6.5.1/ccp4/cmap_header.c
Examining data/libccp4-6.5.1/ccp4/cmtzlib.c
Examining data/libccp4-6.5.1/ccp4/ccp4_errno.h
Examining data/libccp4-6.5.1/ccp4/cmap_labels.c
Examining data/libccp4-6.5.1/ccp4/cmap_stats.c
Examining data/libccp4-6.5.1/ccp4/ccp4_utils.h
Examining data/libccp4-6.5.1/ccp4/cmap_errno.h
Examining data/libccp4-6.5.1/ccp4/ccp4_sysdep.h
Examining data/libccp4-6.5.1/ccp4/ccp4_spg.h
Examining data/libccp4-6.5.1/ccp4/ccp4_types.h
Examining data/libccp4-6.5.1/ccp4/ccp4_fortran.h
Examining data/libccp4-6.5.1/ccp4/ccp4_program.c
Examining data/libccp4-6.5.1/ccp4/ccp4_parser.h
Examining data/libccp4-6.5.1/ccp4/pack_c.h
Examining data/libccp4-6.5.1/ccp4/ccp4_general.c
Examining data/libccp4-6.5.1/ccp4/cmap_close.c
Examining data/libccp4-6.5.1/ccp4/cmap_open.c
Examining data/libccp4-6.5.1/ccp4/ccp4_unitcell.h
Examining data/libccp4-6.5.1/ccp4/ccp4_array.h
Examining data/libccp4-6.5.1/ccp4/library_file.c
Examining data/libccp4-6.5.1/ccp4/ccp4_array.c
Examining data/libccp4-6.5.1/ccp4/cmap_data.c
Examining data/libccp4-6.5.1/ccp4/w32mvs.c
Examining data/libccp4-6.5.1/ccp4/cvecmat.h
Examining data/libccp4-6.5.1/ccp4/csymlib.h
Examining data/libccp4-6.5.1/ccp4/ccp4_file_err.h
Examining data/libccp4-6.5.1/ccp4/library_err.c
Examining data/libccp4-6.5.1/ccp4/cvecmat.c
Examining data/libccp4-6.5.1/ccp4/vmslibrary.c
Examining data/libccp4-6.5.1/ccp4/ccp4_unitcell.c
Examining data/libccp4-6.5.1/ccp4/cmaplib_f.h
Examining data/libccp4-6.5.1/ccp4/csymlib.c
Examining data/libccp4-6.5.1/ccp4/library_utils.c
Examining data/libccp4-6.5.1/ccp4/ccp4_parser.c
Examining data/libccp4-6.5.1/ccp4/cmap_skew.c
Examining data/libccp4-6.5.1/ccp4/cmtzlib.h
Examining data/libccp4-6.5.1/ccp4/ccp4_general.h
Examining data/libccp4-6.5.1/ccp4/cmap_labels.h
Examining data/libccp4-6.5.1/ccp4/cmap_data.h
Examining data/libccp4-6.5.1/ccp4/cmap_skew.h
Examining data/libccp4-6.5.1/ccp4/pack_c.c
Examining data/libccp4-6.5.1/ccp4/w32mvs.h
Examining data/libccp4-6.5.1/ccp4/ccp4_program.h
Examining data/libccp4-6.5.1/fortran/csymlib_f.c
Examining data/libccp4-6.5.1/fortran/ccp4_general_f.c
Examining data/libccp4-6.5.1/fortran/ccp4_unitcell_f.c
Examining data/libccp4-6.5.1/fortran/library_f.c
Examining data/libccp4-6.5.1/fortran/cmtzlib_f.c
Examining data/libccp4-6.5.1/fortran/ccp4_parser_f.c
Examining data/libccp4-6.5.1/fortran/cmaplib_f.c
Examining data/libccp4-6.5.1/fortran/ccp4_diskio_f.c

FINAL RESULTS:

data/libccp4-6.5.1/ccp4/library_utils.c:355:11:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  return (chmod(path,0x0fff));
data/libccp4-6.5.1/ccp4/library_utils.c:358:11:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  return (chmod(path, (mode_t) mode));
data/libccp4-6.5.1/ccp4/vmslibrary.c:98:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  *result = chmod(name,mode); 
data/libccp4-6.5.1/ccp4/ccp4_general.c:214:14:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    nbytes = vprintf(format,args);
data/libccp4-6.5.1/ccp4/ccp4_general.c:508:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(env_file,argv[ienviron]);
data/libccp4-6.5.1/ccp4/ccp4_general.c:660:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(envname[ienv],env_logical_name);
data/libccp4-6.5.1/ccp4/ccp4_general.c:664:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(envtype[ienv],env_file_type);
data/libccp4-6.5.1/ccp4/ccp4_general.c:668:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(envext[ienv],env_file_ext);
data/libccp4-6.5.1/ccp4/ccp4_general.c:725:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(def_file,argv[idefault]);
data/libccp4-6.5.1/ccp4/ccp4_general.c:913:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(file_name,argv[iarg]);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1050:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(envname[*ienv],logical_name);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1062:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(envext[*ienv],file_ext);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1212:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(file_name,file_root);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1220:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(file_name,file_ext);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1345:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(tmpstr,logical_name);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1347:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(tmpstr,file_name);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1376:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(prog_vers_full,ccp4_prog_vers(NULL));
data/libccp4-6.5.1/ccp4/ccp4_general.c:1384:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(prog_vers_str,"version %-10s",ccp4_vers_no());
data/libccp4-6.5.1/ccp4/ccp4_general.c:1409:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(infoline," ### CCP4 %3s: %-17s",ccp4_vers_no(),ccp4ProgramName(NULL));
data/libccp4-6.5.1/ccp4/ccp4_general.c:1424:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(infoline+i,"%s : %-8s##",prog_vers_str,ccp4RCSDate(NULL));
data/libccp4-6.5.1/ccp4/ccp4_program.c:58:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ccp4version,CCP4_VERSION_NO);
data/libccp4-6.5.1/ccp4/ccp4_program.c:63:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(filename,filepath);
data/libccp4-6.5.1/ccp4/ccp4_program.c:64:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(filename,vfile);
data/libccp4-6.5.1/ccp4/ccp4_program.c:311:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(filename,filepath);
data/libccp4-6.5.1/ccp4/ccp4_program.c:322:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename,filepath);
data/libccp4-6.5.1/ccp4/cmtzlib.c:259:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (ntok > 2) strcpy(project,token[2].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:260:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(crystal,project);
data/libccp4-6.5.1/ccp4/cmtzlib.c:281:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(projin[nxtal-1],project);
data/libccp4-6.5.1/ccp4/cmtzlib.c:282:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(crysin[nxtal-1],crystal);
data/libccp4-6.5.1/ccp4/cmtzlib.c:291:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
       strcpy(crystal,token[2].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:293:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(crysin[nxtal-1],crystal);
data/libccp4-6.5.1/ccp4/cmtzlib.c:313:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(projin[nxtal-1],project);
data/libccp4-6.5.1/ccp4/cmtzlib.c:314:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(crysin[nxtal-1],crystal);
data/libccp4-6.5.1/ccp4/cmtzlib.c:352:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(projin[nxtal-1],project);
data/libccp4-6.5.1/ccp4/cmtzlib.c:353:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(crysin[nxtal-1],crystal);
data/libccp4-6.5.1/ccp4/cmtzlib.c:426:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mtz->xtal[jxtalin[iiset]]->pname,projin[jxtalin[iiset]]);
data/libccp4-6.5.1/ccp4/cmtzlib.c:427:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mtz->xtal[jxtalin[iiset]]->xname,crysin[jxtalin[iiset]]);
data/libccp4-6.5.1/ccp4/cmtzlib.c:446:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        if (ntok > 2) strcpy(mtz->xtal[jxtalin[iiset]]->set[nset[jxtalin[iiset]]]->dname,
data/libccp4-6.5.1/ccp4/cmtzlib.c:558:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mtz->mtzsymm.spcgrpname,token[5].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:559:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mtz->mtzsymm.pgname,token[6].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:589:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(label,token[1].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:590:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(type,token[2].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:633:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(keyarg,token[1].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:667:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(label,token[1].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:696:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(label,token[1].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:826:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(batch->gonlab[0],token[1].fullstring); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:827:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(batch->gonlab[1],token[2].fullstring); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:828:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(batch->gonlab[2],token[3].fullstring); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:831:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(batch->gonlab[0],token[1].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1088:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  length = (int) strlen(strcpy(title, mtz->title));
data/libccp4-6.5.1/ccp4/cmtzlib.c:1200:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(clabs[icol],mtz->xtal[i]->set[j]->col[k]->label);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1202:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
       strcpy(ctyps[icol],mtz->xtal[i]->set[j]->col[k]->type);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1228:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(clabs[colin - 1],mtz->xtal[i]->set[j]->col[k]->label);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1230:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
       strcpy(ctyps[colin - 1],mtz->xtal[i]->set[j]->col[k]->type);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1280:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(spgrnx,mtz->mtzsymm.spcgrpname);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1281:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pgnamx,mtz->mtzsymm.pgname);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1351:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(label1,token[i].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1361:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(label2,token[i+1].fullstring);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1373:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(user_labels[j][0],label1);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1374:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(user_labels[j][1],label2);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1385:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(user_labels[j][0],label2);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1386:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(user_labels[j][1],label1);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1425:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(label,labels[ilab]);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1439:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(types[ilab],col->type);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2169:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( path1, xtl->xname );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2171:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( path1, dataset_name );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2228:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat( path1, crystal_name );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2230:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat( path1, dataset_name );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2444:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( path1, xtl->xname );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2446:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( path1, dname );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2712:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(hdrrec,"SYMINF %3d %2d %c %5d %22s %5s %c",mtz->mtzsymm.nsym,
data/libccp4-6.5.1/ccp4/cmtzlib.c:2721:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(hdrrec,"SYMM %74s",symline);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2777:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(hdrrec,"COLUMN %-30s ","M/ISYM");
data/libccp4-6.5.1/ccp4/cmtzlib.c:2779:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(hdrrec,"COLUMN %-30s ",mtz->xtal[i]->set[j]->col[k]->label);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2803:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(hdrrec,"COLSRC %-30s %-36s  %4d","M/ISYM",mtz->xtal[i]->set[j]->col[k]->colsource,mtz->xtal[i]->set[j]->setid);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2805:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(hdrrec,"COLSRC %-30s %-36s  %4d",mtz->xtal[i]->set[j]->col[k]->label,mtz->xtal[i]->set[j]->col[k]->colsource,mtz->xtal[i]->set[j]->setid);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2815:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(hdrrec,"COLGRP %-30s %-30s %-4s %1X %4d","M/ISYM",mtz->xtal[i]->set[j]->col[k]->grpname,mtz->xtal[i]->set[j]->col[k]->grptype,mtz->xtal[i]->set[j]->col[k]->grpposn,mtz->xtal[i]->set[j]->setid);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2817:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(hdrrec,"COLGRP %-30s %-30s %-4s %1X %4d",mtz->xtal[i]->set[j]->col[k]->label,mtz->xtal[i]->set[j]->col[k]->grpname,mtz->xtal[i]->set[j]->col[k]->grptype,mtz->xtal[i]->set[j]->col[k]->grpposn,mtz->xtal[i]->set[j]->setid);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2842:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(hdrrec,"PROJECT %7d %-64s",mtz->xtal[i]->set[j]->setid,
data/libccp4-6.5.1/ccp4/cmtzlib.c:2845:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(hdrrec,"CRYSTAL %7d %-64s",mtz->xtal[i]->set[j]->setid,
data/libccp4-6.5.1/ccp4/cmtzlib.c:2848:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(hdrrec,"DATASET %7d %-64s",mtz->xtal[i]->set[j]->setid,
data/libccp4-6.5.1/ccp4/cmtzlib.c:2941:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
       sprintf(hdrrec,"BHCH %8s%8s%8s",batch->gonlab[0],batch->gonlab[1],batch->gonlab[2]);
data/libccp4-6.5.1/ccp4/cmtzlib.c:3789:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat( path, xtal->xname );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3803:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy( path, path1 );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3806:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat( path, set->dname );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3820:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy( path, path1 );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3823:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat( path, col->label );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3838:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat( path, partial );
data/libccp4-6.5.1/ccp4/csymlib.c:149:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(symopfile,ccp4_utils_joinfilenames(ccp4dir,"syminfo.lib"));
data/libccp4-6.5.1/ccp4/csymlib.c:205:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sg_basisop,filerec+8);
data/libccp4-6.5.1/ccp4/csymlib.c:216:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(sg_symbol_Hall,token[2].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:218:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(sg_symbol_xHM,token[2].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:220:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(sg_symbol_old,token[2].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:222:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(sg_patt_group,token[3].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:224:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(sg_point_group,token[3].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:234:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(sg_asu_descr,token[2].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:244:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(map_asu_x,token[2].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:245:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(map_asu_y,token[3].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:246:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(map_asu_z,token[4].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:248:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(map_asu_ccp4_x,token[2].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:249:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(map_asu_ccp4_y,token[3].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:250:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(map_asu_ccp4_z,token[4].fullstring);
data/libccp4-6.5.1/ccp4/csymlib.c:256:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sg_symop[sg_nsymp++],filerec+6);
data/libccp4-6.5.1/ccp4/csymlib.c:260:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sg_cenop[sg_num_cent++],filerec+6);
data/libccp4-6.5.1/ccp4/csymlib.c:327:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(spacegroup->symbol_Hall,sg_symbol_Hall);
data/libccp4-6.5.1/ccp4/csymlib.c:328:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(spacegroup->symbol_xHM,sg_symbol_xHM);
data/libccp4-6.5.1/ccp4/csymlib.c:329:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(spacegroup->symbol_old,sg_symbol_old);
data/libccp4-6.5.1/ccp4/csymlib.c:331:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(spacegroup->point_group+2,sg_point_group);
data/libccp4-6.5.1/ccp4/csymlib.c:423:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(spacegroup->asu_descr,sg_asu_descr);
data/libccp4-6.5.1/ccp4/csymlib.c:608:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(spacegroup->mapasu_zero_descr,"%s %s %s",map_asu_x,map_asu_y,map_asu_z);
data/libccp4-6.5.1/ccp4/csymlib.c:618:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(spacegroup->mapasu_ccp4_descr,"%s %s %s",map_asu_ccp4_x,map_asu_ccp4_y,map_asu_ccp4_z);
data/libccp4-6.5.1/ccp4/csymlib.c:625:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(spacegroup->mapasu_ccp4_descr,spacegroup->mapasu_zero_descr);
data/libccp4-6.5.1/ccp4/csymlib.c:704:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat(symopbuf,symop);
data/libccp4-6.5.1/ccp4/csymlib.c:916:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(spgname1_upper,tmpstr);
data/libccp4-6.5.1/ccp4/library_err.c:163:8:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  char system[32];
data/libccp4-6.5.1/ccp4/library_err.c:199:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (system >= ccp4_system_nerr)
data/libccp4-6.5.1/ccp4/library_err.c:201:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (code >= ccp4_errlist[system].system_nerr)
data/libccp4-6.5.1/ccp4/library_err.c:203:24:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  return (ccp4_errlist[system].error_list[code]);
data/libccp4-6.5.1/ccp4/library_err.c:225:55:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
             ccp4_errlist[CCP4_ERRGETSYS(ccp4_errno)].system,
data/libccp4-6.5.1/ccp4/library_err.c:294:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(sys_fmt,
data/libccp4-6.5.1/ccp4/library_err.c:307:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(msg_fmt,
data/libccp4-6.5.1/ccp4/library_err.c:308:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	     ccp4_errlist[system].system,
data/libccp4-6.5.1/ccp4/library_err.c:308:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	     ccp4_errlist[system].system,
data/libccp4-6.5.1/ccp4/library_err.c:309:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	     ccp4_errlist[system].error_list[msg_no],
data/libccp4-6.5.1/ccp4/library_err.c:314:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	     ccp4_errlist[system].system,
data/libccp4-6.5.1/ccp4/library_err.c:314:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	     ccp4_errlist[system].system,
data/libccp4-6.5.1/ccp4/library_err.c:315:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	     ccp4_errlist[system].error_list[msg_no],
data/libccp4-6.5.1/ccp4/library_file.c:2164:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (buff, message);
data/libccp4-6.5.1/ccp4/library_file.c:2165:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (buff, cfile->name);
data/libccp4-6.5.1/ccp4/library_file.c:2212:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(msg_curr,cfile->name);
data/libccp4-6.5.1/ccp4/library_utils.c:150:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(param,str);
data/libccp4-6.5.1/ccp4/library_utils.c:161:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(param1,str);
data/libccp4-6.5.1/ccp4/library_utils.c:427:12:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
  userid = getlogin();
data/libccp4-6.5.1/ccp4/pack_c.c:401:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(packfile, PACKIDENTIFIER, x, y);
data/libccp4-6.5.1/ccp4/pack_c.c:481:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  { fprintf(packfile, V2IDENTIFIER, x, y);
data/libccp4-6.5.1/ccp4/pack_c.c:533:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(packfile, PACKIDENTIFIER, x, y);
data/libccp4-6.5.1/ccp4/pack_c.c:614:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  { fprintf(packfile, V2IDENTIFIER, x, y);
data/libccp4-6.5.1/ccp4/pack_c.c:1043:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	{ if (sscanf(header, PACKIDENTIFIER, &x, &y) == 2)
data/libccp4-6.5.1/ccp4/pack_c.c:1045:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	  else if (sscanf(header, V2IDENTIFIER, &x, &y) == 2)
data/libccp4-6.5.1/ccp4/pack_c.c:1086:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	{ if (sscanf(header, PACKIDENTIFIER, &x, &y) == 2)
data/libccp4-6.5.1/ccp4/pack_c.c:1088:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	  else if (sscanf(header, V2IDENTIFIER, &x, &y) == 2)
data/libccp4-6.5.1/ccp4/pack_c.c:1433:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        { if (sscanf(header, PACKIDENTIFIER, x, y) == 2) {
data/libccp4-6.5.1/ccp4/pack_c.c:1436:20:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          else if (sscanf(header, V2IDENTIFIER, x, y) == 2) {
data/libccp4-6.5.1/fortran/ccp4_general_f.c:432:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(string,string1);
data/libccp4-6.5.1/fortran/cmaplib_f.c:146:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(title,tmp_label);
data/libccp4-6.5.1/fortran/cmtzlib_f.c:798:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(label+i*31,user_label_in[*mindx-1][i][1]);
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1666:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(fileout[*mindx-1],temp_name);
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1837:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   len = strlen(strcpy(hline+5,ccp4ProgramName(NULL))) + 5;
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1841:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   len = len + strlen(strcpy(hline+len,date));
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1845:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   len = len + strlen(strcpy(hline+len,time));
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2060:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(crystal_name+i*(pname_len+1),project_name+i*(pname_len+1));
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2393:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(label+i*31,user_label_out[*mindx-1][i][1]);
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2399:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(label+i*31,user_label_in[*mindx-1][j][1]);
data/libccp4-6.5.1/fortran/csymlib_f.c:1094:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(no_colon_name,spacegroup->symbol_xHM);
data/libccp4-6.5.1/fortran/csymlib_f.c:1098:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(no_colon_name,spacegroup->symbol_old);
data/libccp4-6.5.1/fortran/library_f.c:143:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(FTN_STR(str1),cstring);
data/libccp4-6.5.1/fortran/library_f.c:842:19:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if ( (*status = system( str)) == -1 )
data/libccp4-6.5.1/ccp4/ccp4_general.c:466:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  cinclude = (char *) getenv("CINCL");
data/libccp4-6.5.1/ccp4/ccp4_general.c:474:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  home = (char *) getenv("HOME");
data/libccp4-6.5.1/ccp4/ccp4_general.c:1017:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv(logical_name) && no_overwrt) {
data/libccp4-6.5.1/ccp4/ccp4_general.c:1126:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	clibd = (char *) getenv("CLIBD");
data/libccp4-6.5.1/ccp4/ccp4_general.c:1149:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	cscr = (char *) getenv("CCP4_SCR");
data/libccp4-6.5.1/ccp4/ccp4_general.c:1260:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    tmpstr1 = (char *) getenv(logical_name);
data/libccp4-6.5.1/ccp4/ccp4_program.c:60:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  filepath = (char *) getenv("CCP4");
data/libccp4-6.5.1/ccp4/ccp4_program.c:307:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    filepath = (char *) getenv("CCP4");
data/libccp4-6.5.1/ccp4/ccp4_program.c:318:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      filepath = (char *) getenv("HOME");
data/libccp4-6.5.1/ccp4/cmtzlib.c:120:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv(logname) != NULL) {
data/libccp4-6.5.1/ccp4/cmtzlib.c:121:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    filename = strdup(getenv(logname));
data/libccp4-6.5.1/ccp4/cmtzlib.c:2599:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
 taskenv = getenv( "CCP4_TASK_ID" );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3097:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
 if (getenv(logname) != NULL) {
data/libccp4-6.5.1/ccp4/cmtzlib.c:3098:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   filename = strdup(getenv(logname));
data/libccp4-6.5.1/ccp4/csymlib.c:140:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(symopfile = getenv("SYMINFO"))) {
data/libccp4-6.5.1/ccp4/csymlib.c:143:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (!(ccp4dir = getenv("CLIBD"))) {
data/libccp4-6.5.1/ccp4/csymlib.c:165:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(getenv("SYMINFO"))) free(symopfile);
data/libccp4-6.5.1/ccp4/library_file.c:443:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *foreign = getenv ("CONVERT_FROM");
data/libccp4-6.5.1/ccp4/library_file.c:444:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *native = getenv ("NATIVEMTZ");
data/libccp4-6.5.1/ccp4/library_file.c:1052:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *native = getenv ("NATIVEMTZ");
data/libccp4-6.5.1/ccp4/library_file.c:1053:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *foreign = getenv ("CONVERT_FROM");
data/libccp4-6.5.1/ccp4/w32mvs.c:109:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt (int argc,char **argv,char *optstring)
data/libccp4-6.5.1/ccp4/w32mvs.c:126:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      else if (getenv ("_POSIX_OPTION_ORDER") != 0)
data/libccp4-6.5.1/ccp4/w32mvs.h:198:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt (int argc,char **argv,char *optstring);
data/libccp4-6.5.1/fortran/ccp4_diskio_f.c:130:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (strcasecmp(getenv("CCP4_OPEN"),"UNKNOWN"))
data/libccp4-6.5.1/fortran/ccp4_diskio_f.c:132:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (_stricmp(getenv("CCP4_OPEN"),"UNKNOWN"))
data/libccp4-6.5.1/fortran/ccp4_diskio_f.c:153:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(fname = getenv(temp_lognam))) 
data/libccp4-6.5.1/fortran/ccp4_diskio_f.c:185:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (strcasecmp(getenv("CCP4_OPEN"),"UNKNOWN"))
data/libccp4-6.5.1/fortran/ccp4_diskio_f.c:187:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (_stricmp(getenv("CCP4_OPEN"),"UNKNOWN"))
data/libccp4-6.5.1/fortran/ccp4_diskio_f.c:191:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(fname = getenv(temp_lognam))) 
data/libccp4-6.5.1/fortran/ccp4_diskio_f.c:711:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (!(file_name = getenv(log_name)))
data/libccp4-6.5.1/fortran/ccp4_general_f.c:429:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  string1 = (char *) getenv(string);
data/libccp4-6.5.1/fortran/cmaplib_f.c:442:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(file = getenv(temp_map)))
data/libccp4-6.5.1/fortran/cmaplib_f.c:487:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(file = getenv(temp_map)))
data/libccp4-6.5.1/fortran/cmaplib_f.c:555:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(file = getenv("MAPOUT")))
data/libccp4-6.5.1/fortran/cmaplib_f.c:599:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(file = getenv("MAPOUT")))
data/libccp4-6.5.1/fortran/cmaplib_f.c:679:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(file = getenv(temp_map)))
data/libccp4-6.5.1/fortran/cmaplib_f.c:747:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(file = getenv(temp_map)))
data/libccp4-6.5.1/fortran/cmaplib_f.c:834:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(file = getenv(temp_map)))
data/libccp4-6.5.1/fortran/cmaplib_f.c:891:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(file = getenv(temp_map)))
data/libccp4-6.5.1/fortran/cmtzlib_f.c:194:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
 if (getenv(temp_name) != NULL) {
data/libccp4-6.5.1/fortran/cmtzlib_f.c:195:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   fullfilename = strdup(getenv(temp_name));
data/libccp4-6.5.1/fortran/cmtzlib_f.c:202:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
 if (getenv("CMTZ_IN_MEMORY")) cmtz_in_memory = 1;
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1651:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
 if (getenv("CMTZ_IN_MEMORY")) cmtz_in_memory = 1;
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1672:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     if (getenv(temp_name) != NULL) {
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1673:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       fullfilename = strdup(getenv(temp_name));
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2992:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
 if (getenv(fileout[*mindx-1]) != NULL) {
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2993:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   fullfilename = strdup(getenv(fileout[*mindx-1]));
data/libccp4-6.5.1/ccp4/ccp4_array.c:77:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((ccp4_byteptr)(*p)+osize*reclen, data, reclen);
data/libccp4-6.5.1/ccp4/ccp4_array.c:90:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newdata, data, reclen);
data/libccp4-6.5.1/ccp4/ccp4_array.c:102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((ccp4_byteptr)(*p)+osize*reclen, data, n * reclen);
data/libccp4-6.5.1/ccp4/ccp4_array.c:113:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((ccp4_byteptr)(*p)+i*reclen, data, reclen);  
data/libccp4-6.5.1/ccp4/ccp4_array.c:132:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((ccp4_byteptr)(*p)+i*reclen, (ccp4_byteptr)(*p)+nsize*reclen, reclen);
data/libccp4-6.5.1/ccp4/ccp4_general.c:237:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(parent_dir+dir_len, "..");
data/libccp4-6.5.1/ccp4/ccp4_general.c:272:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *envname[CCP4_MAXNAMES],*envtype[CCP4_MAXNAMES],*envext[CCP4_MAXNAMES];
data/libccp4-6.5.1/ccp4/ccp4_general.c:288:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[CCP4_MAXLINE];
data/libccp4-6.5.1/ccp4/ccp4_general.c:338:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      testarg = (char *) ccp4_utils_realloc(testarg,(strlen(argv[iarg])+1)*sizeof(char));
data/libccp4-6.5.1/ccp4/ccp4_general.c:437:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ihelp = atoi(argv[ihelp]);
data/libccp4-6.5.1/ccp4/ccp4_general.c:499:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      env_file = (char *) ccp4_utils_malloc(sizeof(char)*(strlen(argv[ienviron])+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:596:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    envfp = fopen(env_file,"r");
data/libccp4-6.5.1/ccp4/ccp4_general.c:608:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      envfp = fopen(env_file,"r");
data/libccp4-6.5.1/ccp4/ccp4_general.c:716:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      def_file = (char *) ccp4_utils_malloc(sizeof(char)*(strlen(argv[idefault])+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:811:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    deffp = fopen(def_file,"r");
data/libccp4-6.5.1/ccp4/ccp4_general.c:823:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      deffp = fopen(def_file,"r"); 
data/libccp4-6.5.1/ccp4/ccp4_general.c:903:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    logical_name = (char *) ccp4_utils_malloc((strlen(argv[iarg])+1)*sizeof(char));
data/libccp4-6.5.1/ccp4/ccp4_general.c:912:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      file_name = (char *) ccp4_utils_malloc((strlen(argv[iarg])+1)*sizeof(char));
data/libccp4-6.5.1/ccp4/ccp4_general.c:1055:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(envtype[*ienv],"undef");
data/libccp4-6.5.1/ccp4/ccp4_general.c:1185:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(file_ext,"%05d",procid);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1308:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(filename,"r");
data/libccp4-6.5.1/ccp4/ccp4_general.c:1370:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char date[11],time[9],prog_vers_str[19],infoline[100];
data/libccp4-6.5.1/ccp4/ccp4_general.c:1371:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prog_vers_full[MAXLEN_PROGVERSION];
data/libccp4-6.5.1/ccp4/ccp4_general.c:1378:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(prog_vers_str,"version ");
data/libccp4-6.5.1/ccp4/ccp4_parser.c:970:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  filein = fopen(filename,"r");
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1069:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key1[5],key2[5],keyup1[5],keyup2[5];
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1219:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   this_char, this_str[2];
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1308:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      char_value = atoi(this_str);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1608:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4])
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1608:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4])
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1608:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4])
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1704:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_recip_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4])
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1704:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_recip_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4])
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1704:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_recip_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4])
data/libccp4-6.5.1/ccp4/ccp4_parser.h:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   word[5];       /* First four characters of token */
data/libccp4-6.5.1/ccp4/ccp4_parser.h:153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   keyword[5];      /* Keyword (=token[1].token, uppercased) */
data/libccp4-6.5.1/ccp4/ccp4_parser.h:290:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4]);
data/libccp4-6.5.1/ccp4/ccp4_parser.h:290:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4]);
data/libccp4-6.5.1/ccp4/ccp4_parser.h:290:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4]);
data/libccp4-6.5.1/ccp4/ccp4_parser.h:301:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_recip_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4]);
data/libccp4-6.5.1/ccp4/ccp4_parser.h:301:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_recip_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4]);
data/libccp4-6.5.1/ccp4/ccp4_parser.h:301:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *mat4_to_recip_symop(char *symchs_begin, char *symchs_end, const float rsm[4][4]);
data/libccp4-6.5.1/ccp4/ccp4_program.c:35:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ccp4version[MAXLEN_PROGVERSION];
data/libccp4-6.5.1/ccp4/ccp4_program.c:39:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char programversion[MAXLEN_PROGVERSION]="";
data/libccp4-6.5.1/ccp4/ccp4_program.c:66:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         cfile=fopen(filename,"r");
data/libccp4-6.5.1/ccp4/ccp4_program.c:97:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char programname[MAXLEN_PROGNAME]="CCP4";
data/libccp4-6.5.1/ccp4/ccp4_program.c:144:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char RCSDate[MAXLEN_RCSDATE]="";
data/libccp4-6.5.1/ccp4/ccp4_program.c:145:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        tmpstr1[8],tmpstr2[3];
data/libccp4-6.5.1/ccp4/ccp4_program.c:312:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(filename+lpath,"/.agree2ccp4");
data/libccp4-6.5.1/ccp4/ccp4_program.c:323:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(filename+lpath,"/.agree2ccp4");
data/libccp4-6.5.1/ccp4/ccp4_spg.h:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char symbol_Hall[40];   /* Hall symbol */
data/libccp4-6.5.1/ccp4/ccp4_spg.h:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char symbol_xHM[20];    /* Extended Hermann Mauguin symbol  */
data/libccp4-6.5.1/ccp4/ccp4_spg.h:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char symbol_old[20];    /* old spacegroup name */
data/libccp4-6.5.1/ccp4/ccp4_spg.h:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char point_group[20];   /* point group name */
data/libccp4-6.5.1/ccp4/ccp4_spg.h:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char crystal[20];       /* crystal system e.g. MONOCLINIC */
data/libccp4-6.5.1/ccp4/ccp4_spg.h:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char laue_name[20];     /* Laue class name */
data/libccp4-6.5.1/ccp4/ccp4_spg.h:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char patt_name[40];     /* Patterson spacegroup name */
data/libccp4-6.5.1/ccp4/ccp4_spg.h:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char asu_descr[80];     /* asu description from file */
data/libccp4-6.5.1/ccp4/ccp4_spg.h:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mapasu_zero_descr[80];  /* origin-based map asu: description from file */
data/libccp4-6.5.1/ccp4/ccp4_spg.h:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mapasu_ccp4_descr[80];  /* CCP4 map asu: defaults to mapasu_zero */
data/libccp4-6.5.1/ccp4/cmap_data.c:255:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (header) memcpy(output, header,mfile->data.header_size);
data/libccp4-6.5.1/ccp4/cmap_header.c:34:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[224];
data/libccp4-6.5.1/ccp4/cmap_header.c:64:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mfile->map_dim[0],&buffer[0],sizeof(mfile->map_dim));
data/libccp4-6.5.1/ccp4/cmap_header.c:65:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mfile->data_mode,&buffer[12],sizeof(int));
data/libccp4-6.5.1/ccp4/cmap_header.c:66:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mfile->origin[0],&buffer[16],sizeof(mfile->origin));
data/libccp4-6.5.1/ccp4/cmap_header.c:67:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mfile->cell_grid[0],&buffer[28],sizeof(mfile->cell_grid));
data/libccp4-6.5.1/ccp4/cmap_header.c:68:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mfile->cell[0],&buffer[40],sizeof(mfile->cell));
data/libccp4-6.5.1/ccp4/cmap_header.c:69:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mfile->axes_order[0],&buffer[64],sizeof(mfile->axes_order));
data/libccp4-6.5.1/ccp4/cmap_header.c:70:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mfile->stats.min,&buffer[76],sizeof(float));
data/libccp4-6.5.1/ccp4/cmap_header.c:71:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mfile->stats.max,&buffer[80],sizeof(float));
data/libccp4-6.5.1/ccp4/cmap_header.c:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&fmean,&buffer[84],sizeof(float));
data/libccp4-6.5.1/ccp4/cmap_header.c:74:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mfile->spacegroup,&buffer[88],sizeof(int));
data/libccp4-6.5.1/ccp4/cmap_header.c:90:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mfile->symop.size,&buffer[92],sizeof(int));
data/libccp4-6.5.1/ccp4/cmap_header.c:93:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&frms,&buffer[216],sizeof(float));
data/libccp4-6.5.1/ccp4/cmap_header.c:95:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mfile->labels.number,&buffer[220],sizeof(int));
data/libccp4-6.5.1/ccp4/cmap_header.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&result,&buffer[96],sizeof(int));
data/libccp4-6.5.1/ccp4/cmap_header.c:99:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&mfile->skew.rotation[0][0],&buffer[100],sizeof(mfile->skew.rotation));
data/libccp4-6.5.1/ccp4/cmap_header.c:100:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&mfile->skew.translation[0],&buffer[136],sizeof(mfile->skew.translation));
data/libccp4-6.5.1/ccp4/cmap_header.c:123:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[224];
data/libccp4-6.5.1/ccp4/cmap_header.c:128:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[0],&mfile->map_dim[0],sizeof(mfile->map_dim));
data/libccp4-6.5.1/ccp4/cmap_header.c:129:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[12],&mfile->data_mode,sizeof(int));
data/libccp4-6.5.1/ccp4/cmap_header.c:130:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[16],&mfile->origin[0],sizeof(mfile->origin));
data/libccp4-6.5.1/ccp4/cmap_header.c:131:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[28],&mfile->cell_grid[0],sizeof(mfile->cell_grid));
data/libccp4-6.5.1/ccp4/cmap_header.c:132:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[40],&mfile->cell[0],sizeof(mfile->cell));
data/libccp4-6.5.1/ccp4/cmap_header.c:133:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[64],&mfile->axes_order[0],sizeof(mfile->axes_order));
data/libccp4-6.5.1/ccp4/cmap_header.c:134:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[76],&mfile->stats.min,sizeof(float));
data/libccp4-6.5.1/ccp4/cmap_header.c:135:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[80],&mfile->stats.max,sizeof(float));
data/libccp4-6.5.1/ccp4/cmap_header.c:137:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[84],&fmean,sizeof(float));
data/libccp4-6.5.1/ccp4/cmap_header.c:141:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&buffer[88],&mfile->EM_spacegroup,sizeof(int));
data/libccp4-6.5.1/ccp4/cmap_header.c:143:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&buffer[88],&mfile->spacegroup,sizeof(int));
data/libccp4-6.5.1/ccp4/cmap_header.c:146:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[92],&mfile->symop.size,sizeof(int));
data/libccp4-6.5.1/ccp4/cmap_header.c:147:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[180],&mfile->user_access,sizeof(mfile->user_access));
data/libccp4-6.5.1/ccp4/cmap_header.c:149:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[208],"MAP ",4U);
data/libccp4-6.5.1/ccp4/cmap_header.c:151:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[216],&frms,sizeof(float));
data/libccp4-6.5.1/ccp4/cmap_header.c:152:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buffer[220],&mfile->labels.number,sizeof(int));
data/libccp4-6.5.1/ccp4/cmap_header.c:156:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&buffer[96],&result, sizeof(int));
data/libccp4-6.5.1/ccp4/cmap_header.c:157:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&buffer[100],&mfile->skew.rotation[0][0],sizeof(mfile->skew.rotation));
data/libccp4-6.5.1/ccp4/cmap_header.c:158:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&buffer[148],&mfile->skew.translation[0],sizeof(mfile->skew.translation));
data/libccp4-6.5.1/ccp4/cmap_labels.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[81], *cptr;
data/libccp4-6.5.1/ccp4/cmap_labels.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[80];
data/libccp4-6.5.1/ccp4/cmap_open.c:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[4];
data/libccp4-6.5.1/ccp4/cmap_symop.c:126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[80];
data/libccp4-6.5.1/ccp4/cmap_symop.c:128:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, symop, (strlen(symop) > n_byt_symop) ?
data/libccp4-6.5.1/ccp4/cmaplib.h:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *labels[10];
data/libccp4-6.5.1/ccp4/cmaplib.h:114:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char EM_exthead_type[5];
data/libccp4-6.5.1/ccp4/cmaplib.h:115:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char EM_contents[5];
data/libccp4-6.5.1/ccp4/cmaplib.h:126:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char user_access[28];
data/libccp4-6.5.1/ccp4/cmtzlib.c:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char crysin[MXTALS][65],projin[MXTALS][65],crystal[65],project[65];
data/libccp4-6.5.1/ccp4/cmtzlib.c:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mkey[4], keyarg[76], hdrrec[MTZRECORDLENGTH+1], label[31], type[3];
data/libccp4-6.5.1/ccp4/cmtzlib.c:207:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(projin[0],"HKL_base");
data/libccp4-6.5.1/ccp4/cmtzlib.c:208:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(crysin[0],"HKL_base");
data/libccp4-6.5.1/ccp4/cmtzlib.c:214:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(project,"dummy");
data/libccp4-6.5.1/ccp4/cmtzlib.c:215:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(crystal,"dummy");
data/libccp4-6.5.1/ccp4/cmtzlib.c:258:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(project,"dummy");
data/libccp4-6.5.1/ccp4/cmtzlib.c:355:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(crysin[nxtal-1]+strlen(crystal),"%d",nxtal);
data/libccp4-6.5.1/ccp4/cmtzlib.c:401:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(mtz->xtal[0]->pname,"HKL_base");
data/libccp4-6.5.1/ccp4/cmtzlib.c:402:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(mtz->xtal[0]->xname,"HKL_base");
data/libccp4-6.5.1/ccp4/cmtzlib.c:406:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(mtz->xtal[0]->set[0]->dname,"HKL_base");
data/libccp4-6.5.1/ccp4/cmtzlib.c:445:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(mtz->xtal[jxtalin[iiset]]->set[nset[jxtalin[iiset]]]->dname,"dummy");
data/libccp4-6.5.1/ccp4/cmtzlib.c:502:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(hdrrec+10) != MTZ_MAJOR_VERSN) {
data/libccp4-6.5.1/ccp4/cmtzlib.c:505:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	       atoi(hdrrec+10),atoi(hdrrec+12));
data/libccp4-6.5.1/ccp4/cmtzlib.c:505:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	       atoi(hdrrec+10),atoi(hdrrec+12));
data/libccp4-6.5.1/ccp4/cmtzlib.c:512:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(hdrrec+12) != MTZ_MINOR_VERSN) {
data/libccp4-6.5.1/ccp4/cmtzlib.c:515:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	       atoi(hdrrec+10),atoi(hdrrec+12));
data/libccp4-6.5.1/ccp4/cmtzlib.c:515:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	       atoi(hdrrec+10),atoi(hdrrec+12));
data/libccp4-6.5.1/ccp4/cmtzlib.c:611:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(label,"M_ISYM");
data/libccp4-6.5.1/ccp4/cmtzlib.c:635:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(mtz->mnf.amnf,"NAN");
data/libccp4-6.5.1/ccp4/cmtzlib.c:670:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(label,"M_ISYM");
data/libccp4-6.5.1/ccp4/cmtzlib.c:699:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(label,"M_ISYM");
data/libccp4-6.5.1/ccp4/cmtzlib.c:747:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy( mtz->unknown_headers+mtz->n_unknown_headers*MTZRECORDLENGTH, hdrrec, MTZRECORDLENGTH );
data/libccp4-6.5.1/ccp4/cmtzlib.c:1198:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(clabs[icol],"M/ISYM");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1226:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(clabs[colin - 1],"M/ISYM");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1268:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char spgconf_temp[2];
data/libccp4-6.5.1/ccp4/cmtzlib.c:1315:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char label1[31],label2[31];
data/libccp4-6.5.1/ccp4/cmtzlib.c:1417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char label[31];
data/libccp4-6.5.1/ccp4/cmtzlib.c:1432:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(label,"M_ISYM");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1461:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int ccp4_lridx(const MTZ *mtz, const MTZSET *set, char crystal_name[64], 
data/libccp4-6.5.1/ccp4/cmtzlib.c:1462:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char dataset_name[64], char project_name[64], int *isets, 
data/libccp4-6.5.1/ccp4/cmtzlib.c:1462:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char dataset_name[64], char project_name[64], int *isets, 
data/libccp4-6.5.1/ccp4/cmtzlib.c:1655:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[MTZRECORDLENGTH+1],symline[81];
data/libccp4-6.5.1/ccp4/cmtzlib.c:1872:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[MTZRECORDLENGTH+1];
data/libccp4-6.5.1/ccp4/cmtzlib.c:1953:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char labtype[26],axes[5],string1[40],string2[40];
data/libccp4-6.5.1/ccp4/cmtzlib.c:1957:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(labtype,"oscillation data");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1960:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(labtype,"area detector data");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1963:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(labtype,"Laue data");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1966:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(labtype,"*** unknown data type ***");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1971:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(axes,"a*");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1974:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(axes,"b*");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1977:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(axes,"c*");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1980:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(axes,"none");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1997:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(string1,"Orientation matrix U .............");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1998:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(string2,"    (including setting angles)    ");
data/libccp4-6.5.1/ccp4/cmtzlib.c:2000:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(string1,"Standard orientation matrix U ....");
data/libccp4-6.5.1/ccp4/cmtzlib.c:2001:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(string2,"                                  ");
data/libccp4-6.5.1/ccp4/cmtzlib.c:2153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path1[200];
data/libccp4-6.5.1/ccp4/cmtzlib.c:2218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path1[200], *path2;
data/libccp4-6.5.1/ccp4/cmtzlib.c:2274:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char spgconf_temp[2]="";
data/libccp4-6.5.1/ccp4/cmtzlib.c:2373:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cbatch[95]=" ";
data/libccp4-6.5.1/ccp4/cmtzlib.c:2440:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path1[200];
data/libccp4-6.5.1/ccp4/cmtzlib.c:2580:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char hdrrec[81],symline[81],spgname[MAXSPGNAMELENGTH+3];
data/libccp4-6.5.1/ccp4/cmtzlib.c:2592:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char colsource[37], *taskenv;
data/libccp4-6.5.1/ccp4/cmtzlib.c:2606:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf( colsource, "CREATED_%02d/%02d/%04d_%02d:%02d:%02d",
data/libccp4-6.5.1/ccp4/cmtzlib.c:2654:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(hdrrec,"VERS MTZ:V%d.%d",MTZ_MAJOR_VERSN,MTZ_MINOR_VERSN);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2658:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(hdrrec,"TITLE ");
data/libccp4-6.5.1/ccp4/cmtzlib.c:2668:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(hdrrec,"NCOL %8d %12d %8d",MtzNumActiveCol(mtz),mtz->nref,numbat);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2678:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(hdrrec,"CELL  %9.4f %9.4f %9.4f %9.4f %9.4f %9.4f",mtz->xtal[i]->cell[0],
data/libccp4-6.5.1/ccp4/cmtzlib.c:2692:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(hdrrec,"CELL  %9.4f %9.4f %9.4f %9.4f %9.4f %9.4f",xtl->cell[0],
data/libccp4-6.5.1/ccp4/cmtzlib.c:2701:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(hdrrec,"SORT  %3d %3d %3d %3d %3d",isort[0],isort[1],isort[2],
data/libccp4-6.5.1/ccp4/cmtzlib.c:2751:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(hdrrec,"RESO %-20.16f %-20.16f",mtz->resmin_out,mtz->resmax_out);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2758:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(hdrrec,"VALM NAN");
data/libccp4-6.5.1/ccp4/cmtzlib.c:2761:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(hdrrec,"VALM %-20f",mtz->mnf.fmnf);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2793:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(hdrrec+38,"%c %17.9g %17.9g %4d",
data/libccp4-6.5.1/ccp4/cmtzlib.c:2829:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(hdrrec,"NDIF %8d",MtzNumActiveSet(mtz));
data/libccp4-6.5.1/ccp4/cmtzlib.c:2851:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(hdrrec,"DCELL   %7d %10.4f%10.4f%10.4f%10.4f%10.4f%10.4f",
data/libccp4-6.5.1/ccp4/cmtzlib.c:2857:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(hdrrec,"DWAVEL  %7d %10.5f",mtz->xtal[i]->set[j]->setid,
data/libccp4-6.5.1/ccp4/cmtzlib.c:2888:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(hdrrec,"BATCH ");
data/libccp4-6.5.1/ccp4/cmtzlib.c:2891:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(hdrrec+6+6*j,"%6d",batch->num);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2904:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(hdrrec,"END ");
data/libccp4-6.5.1/ccp4/cmtzlib.c:2911:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(hdrrec,"MTZHIST %3d",mtz->histlines);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2925:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(hdrrec,"MTZBATS");
data/libccp4-6.5.1/ccp4/cmtzlib.c:2928:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(hdrrec,"BH %8d%8d%8d%8d",batch->num,nwords,nintegers,nreals);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2930:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(hdrrec,"TITLE ");
data/libccp4-6.5.1/ccp4/cmtzlib.c:2943:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(hdrrec,"BHCH                         ");
data/libccp4-6.5.1/ccp4/cmtzlib.c:2953:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(hdrrec,"MTZENDOFHEADERS ");
data/libccp4-6.5.1/ccp4/cmtzlib.c:3216:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char hdrrec[MTZRECORDLENGTH];
data/libccp4-6.5.1/ccp4/cmtzlib.c:3248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dummy_xname[17];
data/libccp4-6.5.1/ccp4/cmtzlib.c:3251:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(dummy_xname,"NULL_xname%2.2d%2.2d%2.2d",itime[0],itime[1],itime[2]);
data/libccp4-6.5.1/ccp4/cmtzlib.c:3293:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(mtz->mnf.amnf,"NAN");
data/libccp4-6.5.1/ccp4/cmtzlib.c:3441:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
MTZXTAL *MtzAddXtal(MTZ *mtz, const char *xname, const char *pname,
data/libccp4-6.5.1/ccp4/cmtzlib.c:3441:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
MTZXTAL *MtzAddXtal(MTZ *mtz, const char *xname, const char *pname,
data/libccp4-6.5.1/ccp4/cmtzlib.c:3837:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  while ( j++ < njust ) strcat( path, "*/" );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3866:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *path1, path2[200];
data/libccp4-6.5.1/ccp4/cmtzlib.c:3887:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *path1, path2[200];
data/libccp4-6.5.1/ccp4/cmtzlib.c:3908:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *path1, path2[200];
data/libccp4-6.5.1/ccp4/cmtzlib.h:344:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
MTZXTAL *MtzAddXtal(MTZ *mtz, const char *xname, const char *pname,
data/libccp4-6.5.1/ccp4/cmtzlib.h:344:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
MTZXTAL *MtzAddXtal(MTZ *mtz, const char *xname, const char *pname,
data/libccp4-6.5.1/ccp4/cmtzlib.h:770:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int ccp4_lridx(const MTZ *mtz, const MTZSET *set, char crystal_name[64], 
data/libccp4-6.5.1/ccp4/cmtzlib.h:771:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char dataset_name[64], char project_name[64], int *isets, 
data/libccp4-6.5.1/ccp4/cmtzlib.h:771:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char dataset_name[64], char project_name[64], int *isets, 
data/libccp4-6.5.1/ccp4/csymlib.c:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *symopfile, *ccp4dir, filerec[80];
data/libccp4-6.5.1/ccp4/csymlib.c:92:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sg_symbol_old[20],sg_symbol_Hall[40],sg_symbol_xHM[20],
data/libccp4-6.5.1/ccp4/csymlib.c:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sg_basisop[80],sg_symop[192][80],sg_cenop[4][80];
data/libccp4-6.5.1/ccp4/csymlib.c:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sg_asu_descr[80], map_asu_x[12], map_asu_y[12], map_asu_z[12];    
data/libccp4-6.5.1/ccp4/csymlib.c:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char map_asu_ccp4_x[12], map_asu_ccp4_y[12], map_asu_ccp4_z[12]; 
data/libccp4-6.5.1/ccp4/csymlib.c:159:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  filein = fopen(symopfile,"r");
data/libccp4-6.5.1/ccp4/csymlib.c:330:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(spacegroup->point_group,"PG");
data/libccp4-6.5.1/ccp4/csymlib.c:333:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(spacegroup->crystal,"TRICLINIC");
data/libccp4-6.5.1/ccp4/csymlib.c:335:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(spacegroup->crystal,"MONOCLINIC");
data/libccp4-6.5.1/ccp4/csymlib.c:337:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(spacegroup->crystal,"ORTHORHOMBIC");
data/libccp4-6.5.1/ccp4/csymlib.c:339:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(spacegroup->crystal,"TETRAGONAL");
data/libccp4-6.5.1/ccp4/csymlib.c:341:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(spacegroup->crystal,"TRIGONAL");
data/libccp4-6.5.1/ccp4/csymlib.c:343:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(spacegroup->crystal,"HEXAGONAL");
data/libccp4-6.5.1/ccp4/csymlib.c:345:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(spacegroup->crystal,"CUBIC");
data/libccp4-6.5.1/ccp4/csymlib.c:437:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->patt_name,"P-1");
data/libccp4-6.5.1/ccp4/csymlib.c:445:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"P2/m");
data/libccp4-6.5.1/ccp4/csymlib.c:448:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"C2/m");
data/libccp4-6.5.1/ccp4/csymlib.c:457:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"Pmmm");
data/libccp4-6.5.1/ccp4/csymlib.c:460:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"Cmmm");
data/libccp4-6.5.1/ccp4/csymlib.c:463:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"Immm");
data/libccp4-6.5.1/ccp4/csymlib.c:466:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"Fmmm");
data/libccp4-6.5.1/ccp4/csymlib.c:475:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"4/m");
data/libccp4-6.5.1/ccp4/csymlib.c:481:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"P4/m");
data/libccp4-6.5.1/ccp4/csymlib.c:484:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"I4/m");
data/libccp4-6.5.1/ccp4/csymlib.c:494:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"P4/mmm");
data/libccp4-6.5.1/ccp4/csymlib.c:497:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"I4/mmm");
data/libccp4-6.5.1/ccp4/csymlib.c:506:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"P-3");
data/libccp4-6.5.1/ccp4/csymlib.c:510:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"H-3");
data/libccp4-6.5.1/ccp4/csymlib.c:513:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"R-3");
data/libccp4-6.5.1/ccp4/csymlib.c:521:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->patt_name,"P-31m");
data/libccp4-6.5.1/ccp4/csymlib.c:529:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"P-3m1");
data/libccp4-6.5.1/ccp4/csymlib.c:533:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"H-3m");
data/libccp4-6.5.1/ccp4/csymlib.c:536:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"R-3m");
data/libccp4-6.5.1/ccp4/csymlib.c:545:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->patt_name,"P6/m");
data/libccp4-6.5.1/ccp4/csymlib.c:553:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"6/mmm");
data/libccp4-6.5.1/ccp4/csymlib.c:558:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->patt_name,"P6/mmm");
data/libccp4-6.5.1/ccp4/csymlib.c:566:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"Pm-3");
data/libccp4-6.5.1/ccp4/csymlib.c:569:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"Im-3");
data/libccp4-6.5.1/ccp4/csymlib.c:572:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"Fm-3");
data/libccp4-6.5.1/ccp4/csymlib.c:581:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"Pm-3m");
data/libccp4-6.5.1/ccp4/csymlib.c:584:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"Im-3m");
data/libccp4-6.5.1/ccp4/csymlib.c:587:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(spacegroup->patt_name,"Fm-3m");
data/libccp4-6.5.1/ccp4/csymlib.c:666:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int symfr_driver (const char *line, float rot[MAXSYMOPS][4][4])
data/libccp4-6.5.1/ccp4/csymlib.c:748:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int ccp4_spg_get_centering(const char *symbol_Hall, float cent_ops[4][3])
data/libccp4-6.5.1/ccp4/csymlib.c:949:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ch2,"P1");
data/libccp4-6.5.1/ccp4/csymlib.c:1321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char centric_zone[8];
data/libccp4-6.5.1/ccp4/csymlib.c:1344:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"0kl") );
data/libccp4-6.5.1/ccp4/csymlib.c:1346:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"h0l") );
data/libccp4-6.5.1/ccp4/csymlib.c:1348:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"hk0") );
data/libccp4-6.5.1/ccp4/csymlib.c:1350:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"hhl") );
data/libccp4-6.5.1/ccp4/csymlib.c:1352:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"hkh") );
data/libccp4-6.5.1/ccp4/csymlib.c:1354:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"hkk") );
data/libccp4-6.5.1/ccp4/csymlib.c:1356:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"h -hl") );
data/libccp4-6.5.1/ccp4/csymlib.c:1358:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"hk -h") );
data/libccp4-6.5.1/ccp4/csymlib.c:1360:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"hk -k") );
data/libccp4-6.5.1/ccp4/csymlib.c:1362:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"-h 2h l") );
data/libccp4-6.5.1/ccp4/csymlib.c:1364:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"2h -h l") );
data/libccp4-6.5.1/ccp4/csymlib.c:1366:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(centric_zone,"hkl") );
data/libccp4-6.5.1/ccp4/csymlib.c:1481:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char epsilon_zone[8];
data/libccp4-6.5.1/ccp4/csymlib.c:1503:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"h00") );
data/libccp4-6.5.1/ccp4/csymlib.c:1505:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"0k0") );
data/libccp4-6.5.1/ccp4/csymlib.c:1507:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"00l") );
data/libccp4-6.5.1/ccp4/csymlib.c:1509:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"hh0") );
data/libccp4-6.5.1/ccp4/csymlib.c:1511:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"h0h") );
data/libccp4-6.5.1/ccp4/csymlib.c:1513:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"0kk") );
data/libccp4-6.5.1/ccp4/csymlib.c:1515:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"h -h0") );
data/libccp4-6.5.1/ccp4/csymlib.c:1517:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"h0 -h") );
data/libccp4-6.5.1/ccp4/csymlib.c:1519:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"0k -k") );
data/libccp4-6.5.1/ccp4/csymlib.c:1521:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"-h 2h 0") );
data/libccp4-6.5.1/ccp4/csymlib.c:1523:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"2h -h 0") );
data/libccp4-6.5.1/ccp4/csymlib.c:1525:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"hhh") );
data/libccp4-6.5.1/ccp4/csymlib.c:1527:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return ( strcpy(epsilon_zone,"hkl") );
data/libccp4-6.5.1/ccp4/csymlib.c:1729:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rsymop[80];
data/libccp4-6.5.1/ccp4/csymlib.c:1810:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int range_to_limits(const char *range, float limits[2])
data/libccp4-6.5.1/ccp4/csymlib.c:1816:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2];
data/libccp4-6.5.1/ccp4/csymlib.c:1852:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          value2 = (float) atoi(buf);
data/libccp4-6.5.1/ccp4/csymlib.c:1854:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          value1 = (float) atoi(buf);
data/libccp4-6.5.1/ccp4/csymlib.c:1949:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"-1");
data/libccp4-6.5.1/ccp4/csymlib.c:1957:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"2/m");
data/libccp4-6.5.1/ccp4/csymlib.c:1965:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"2/m");
data/libccp4-6.5.1/ccp4/csymlib.c:1973:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"mmm");
data/libccp4-6.5.1/ccp4/csymlib.c:1981:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"4/m");
data/libccp4-6.5.1/ccp4/csymlib.c:1989:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"4/mmm");
data/libccp4-6.5.1/ccp4/csymlib.c:1997:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"-3");
data/libccp4-6.5.1/ccp4/csymlib.c:2005:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"3bar1m");
data/libccp4-6.5.1/ccp4/csymlib.c:2013:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"3barm");
data/libccp4-6.5.1/ccp4/csymlib.c:2021:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"6/m");
data/libccp4-6.5.1/ccp4/csymlib.c:2029:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"6/mmm");
data/libccp4-6.5.1/ccp4/csymlib.c:2037:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"m3bar");
data/libccp4-6.5.1/ccp4/csymlib.c:2045:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(spacegroup->laue_name,"m3barm");
data/libccp4-6.5.1/ccp4/csymlib.h:220:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int ccp4_spg_get_centering(const char *symbol_Hall, float cent_ops[4][3]);
data/libccp4-6.5.1/ccp4/csymlib.h:601:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int range_to_limits(const char *range, float limits[2]);
data/libccp4-6.5.1/ccp4/library_err.c:163:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char system[32];
data/libccp4-6.5.1/ccp4/library_file.c:888:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmode[5];
data/libccp4-6.5.1/ccp4/library_file.c:914:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    cfile->fd = open(filename, openflags);
data/libccp4-6.5.1/ccp4/library_file.c:948:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      cfile->stream = fopen (filename, fmode,
data/libccp4-6.5.1/ccp4/library_file.c:952:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      cfile->stream = fopen (filename, fmode,
data/libccp4-6.5.1/ccp4/library_file.c:957:23:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      cfile->stream = tmpfile();
data/libccp4-6.5.1/ccp4/library_file.c:961:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        cfile->stream = fopen (filename, fmode);
data/libccp4-6.5.1/ccp4/library_file.c:965:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      cfile->stream = fopen (filename, fmode);
data/libccp4-6.5.1/ccp4/library_file.c:967:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    cfile->stream = fopen (filename, fmode);
data/libccp4-6.5.1/ccp4/library_file.c:1051:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char mtstring[4];    /* machine stamp */
data/libccp4-6.5.1/ccp4/library_file.c:1100:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char mtstring[4];    /* machine stamp */
data/libccp4-6.5.1/ccp4/library_file.c:1607:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out_buffer[8];
data/libccp4-6.5.1/ccp4/library_file.c:1613:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out_buffer, out_ptr, _item_sizes[COMP64]);
data/libccp4-6.5.1/ccp4/library_file.c:1627:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out_buffer, out_ptr, _item_sizes[COMP64]);
data/libccp4-6.5.1/ccp4/library_file.c:1632:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out_buffer, out_ptr, _item_sizes[COMP64]);
data/libccp4-6.5.1/ccp4/library_file.c:1716:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out_buffer[4];
data/libccp4-6.5.1/ccp4/library_file.c:1775:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out_buffer[4];
data/libccp4-6.5.1/ccp4/library_file.c:1781:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out_buffer, out_ptr, _item_sizes[FLOAT32]);
data/libccp4-6.5.1/ccp4/library_file.c:1791:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out_buffer, out_ptr, _item_sizes[FLOAT32]);
data/libccp4-6.5.1/ccp4/library_file.c:1796:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out_buffer, out_ptr, _item_sizes[FLOAT32]);
data/libccp4-6.5.1/ccp4/library_file.c:1874:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out_buffer[4];
data/libccp4-6.5.1/ccp4/library_file.c:1933:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out_buffer[2];
data/libccp4-6.5.1/ccp4/library_file.c:2215:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (cfile->open) {
data/libccp4-6.5.1/ccp4/library_file.c:2217:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(msg_start, " opened");
data/libccp4-6.5.1/ccp4/library_file.c:2221:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(msg_start, " closed");
data/libccp4-6.5.1/ccp4/library_file.c:2227:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(msg_start, ", append mode");
data/libccp4-6.5.1/ccp4/library_file.c:2231:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(msg_start, ", read-write mode");
data/libccp4-6.5.1/ccp4/library_file.c:2235:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(msg_start, ", write mode");
data/libccp4-6.5.1/ccp4/library_file.c:2239:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(msg_start, ", read mode");
data/libccp4-6.5.1/ccp4/library_file.h:51:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  unsigned int open : 1;
data/libccp4-6.5.1/ccp4/library_file.h:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[8];
data/libccp4-6.5.1/ccp4/library_utils.c:422:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char windows_username[512];
data/libccp4-6.5.1/ccp4/library_utils.c:576:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(date,"%2d/%2d/%4d",iarray[0],iarray[1],iarray[2]);
data/libccp4-6.5.1/ccp4/library_utils.c:606:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(time,"%2.2d:%2.2d:%2.2d",iarray[0],iarray[1],iarray[2]);
data/libccp4-6.5.1/ccp4/mtzdata.h:61:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct { char label[31];       /**< column name as given by user */
data/libccp4-6.5.1/ccp4/mtzdata.h:62:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 char type[3];         /**< column type */
data/libccp4-6.5.1/ccp4/mtzdata.h:68:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	         char colsource[37];   /**< column source - originating job */
data/libccp4-6.5.1/ccp4/mtzdata.h:69:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	         char grpname[31];     /**< column group name */
data/libccp4-6.5.1/ccp4/mtzdata.h:70:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	         char grptype[5];      /**< column group type */
data/libccp4-6.5.1/ccp4/mtzdata.h:76:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 char dname[65];       /**< Dataset name */
data/libccp4-6.5.1/ccp4/mtzdata.h:84:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 char xname[65];       /**< Crystal name */
data/libccp4-6.5.1/ccp4/mtzdata.h:85:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 char pname[65];       /**< Project name */
data/libccp4-6.5.1/ccp4/mtzdata.h:95:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 char title[71];       /**< batch title */
data/libccp4-6.5.1/ccp4/mtzdata.h:96:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 char gonlab[3][9];    /**< names of the three axes */
data/libccp4-6.5.1/ccp4/mtzdata.h:157:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 char spcgrpname[MAXSPGNAMELENGTH+1];  /**< spacegroup name */
data/libccp4-6.5.1/ccp4/mtzdata.h:163:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 char pgname[MAXPGNAMELENGTH+1];      /**< pointgroup name */
data/libccp4-6.5.1/ccp4/mtzdata.h:171:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef union { char amnf[4]; 
data/libccp4-6.5.1/ccp4/mtzdata.h:178:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 char title[71];       /**< title of mtz structure */
data/libccp4-6.5.1/ccp4/pack_c.c:296:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char c_filename[1024];
data/libccp4-6.5.1/ccp4/pack_c.c:321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char c_filename[1024];
data/libccp4-6.5.1/ccp4/pack_c.c:344:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char c_filename[1024];
data/libccp4-6.5.1/ccp4/pack_c.c:367:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char c_filename[1024];
data/libccp4-6.5.1/ccp4/pack_c.c:439:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *packfile = fopen(filename, "a");
data/libccp4-6.5.1/ccp4/pack_c.c:475:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  packfile = fopen(filename, "a");
data/libccp4-6.5.1/ccp4/pack_c.c:572:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *packfile = fopen(filename, "a");
data/libccp4-6.5.1/ccp4/pack_c.c:608:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  packfile = fopen(filename, "a");
data/libccp4-6.5.1/ccp4/pack_c.c:980:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char c_filename[1024];
data/libccp4-6.5.1/ccp4/pack_c.c:1002:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char c_filename[1024];
data/libccp4-6.5.1/ccp4/pack_c.c:1027:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[BUFSIZ];
data/libccp4-6.5.1/ccp4/pack_c.c:1033:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  packfile = fopen(filename, "r");
data/libccp4-6.5.1/ccp4/pack_c.c:1070:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[BUFSIZ];
data/libccp4-6.5.1/ccp4/pack_c.c:1076:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  packfile = fopen(filename, "r");
data/libccp4-6.5.1/ccp4/pack_c.c:1422:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[BUFSIZ];
data/libccp4-6.5.1/ccp4/pack_c.c:1424:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  packfile = fopen(filename, "r");
data/libccp4-6.5.1/ccp4/pack_c.c:1460:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char c_filename[1024];
data/libccp4-6.5.1/ccp4/pack_c.c:1488:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(buff, img + (i * *x), sizeof(WORD) * *x);
data/libccp4-6.5.1/ccp4/pack_c.c:1489:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(img + (i * *x), img + (j * *x), sizeof(WORD) * *x);
data/libccp4-6.5.1/ccp4/pack_c.c:1490:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(img + (j * *x), buff, sizeof(WORD) * *x);}
data/libccp4-6.5.1/ccp4/pack_c.c:1511:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(buff, img + (i * *x), sizeof(LONG) * *x);
data/libccp4-6.5.1/ccp4/pack_c.c:1512:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(img + (i * *x), img + (j * *x), sizeof(LONG) * *x);
data/libccp4-6.5.1/ccp4/pack_c.c:1513:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(img + (j * *x), buff, sizeof(LONG) * *x);}
data/libccp4-6.5.1/ccp4/vmslibrary.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[MAXFLEN];
data/libccp4-6.5.1/ccp4/vmslibrary.c:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[MAXFLEN];
data/libccp4-6.5.1/ccp4/w32mvs.c:97:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  bcopy (&argv[first_nonopt], temp, nonopts_size);
data/libccp4-6.5.1/ccp4/w32mvs.c:98:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  bcopy (&argv[last_nonopt], &argv[first_nonopt],
data/libccp4-6.5.1/ccp4/w32mvs.c:100:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  bcopy (temp, &argv[first_nonopt + optind - last_nonopt],
data/libccp4-6.5.1/ccp4/w32mvs.h:139:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy memmove
data/libccp4-6.5.1/fortran/ccp4_general_f.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_errstr[TMP_LENGTH];
data/libccp4-6.5.1/fortran/ccp4_general_f.c:284:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char date[11];
data/libccp4-6.5.1/fortran/ccp4_general_f.c:319:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char time[9];
data/libccp4-6.5.1/fortran/cmaplib_f.c:673:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_title[81], *temp_map, *file;
data/libccp4-6.5.1/fortran/cmaplib_f.c:741:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_title[81], *temp_map, *file;
data/libccp4-6.5.1/fortran/cmaplib_f.c:828:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_title[81], *temp_map, *file;
data/libccp4-6.5.1/fortran/cmaplib_f.c:885:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_title[81], *temp_map, *file;
data/libccp4-6.5.1/fortran/cmaplib_f.c:1149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[80];
data/libccp4-6.5.1/fortran/cmaplib_f.c:1176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[80];
data/libccp4-6.5.1/fortran/cmaplib_f.c:1211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[81];
data/libccp4-6.5.1/fortran/cmaplib_f.c:1253:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[81];
data/libccp4-6.5.1/fortran/cmaplib_f.c:1788:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char symop[81];
data/libccp4-6.5.1/fortran/cmaplib_f.c:1815:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char symop[81];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:85:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char fileout[MFILES][MAXFLEN];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:88:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char user_label_in[MFILES][MCOLUMNS][2][31];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:89:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char user_label_out[MFILES][MCOLUMNS][2][31];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_title[71];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:299:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mtzvers[20];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:305:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(mtzvers,"MTZ:V%d.%d",MTZ_MAJOR_VERSN,MTZ_MINOR_VERSN);
data/libccp4-6.5.1/fortran/cmtzlib_f.c:407:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cclabs[MCOLUMNS][31]={{0}}, cctyps[MCOLUMNS][3]={{0}};
data/libccp4-6.5.1/fortran/cmtzlib_f.c:450:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cclabs[MCOLUMNS][31]={{0}}, cctyps[MCOLUMNS][3]={{0}};
data/libccp4-6.5.1/fortran/cmtzlib_f.c:513:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ltypex_temp[2],spgrnx_temp[MAXSPGNAMELENGTH+1], pgnamx_temp[11], spgconf_temp[2];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:538:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ltypex_temp[2],spgrnx_temp[MAXSPGNAMELENGTH+1], pgnamx_temp[11];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:902:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cxname[64], cdname[64], cpname[64];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1027:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cxname[64], cdname[64], cpname[64];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1087:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cxname[64], cdname[64], cpname[64];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1337:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char btitle[71];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1421:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cbatch[94];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1462:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cbatch[94];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1514:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cbatch[94];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1635:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *temp_name, *fullfilename, err_str[300];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1658:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(mtzdata[*mindx-1]->xtal[0]->xname,"HKL_base");
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1659:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(mtzdata[*mindx-1]->xtal[0]->pname,"HKL_base");
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1661:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(mtzdata[*mindx-1]->xtal[0]->set[0]->dname,"HKL_base");
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1678:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(err_str,"LWOPEN_NOEXIT: output file is same as open input file: ");
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1691:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(err_str,"LWOPEN_NOEXIT: failed to open output file ");
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1819:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char hline[MTZRECORDLENGTH],date[11],time[9],*temp_hstrng;
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1835:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(hline,"From ");
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1998:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char xname[200]="unknown", pname[200]="unknown", dname[200]="unknown";
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2589:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cbatch[95]=" ";
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2646:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cbatch[94];
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2865:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(mtzdata[*mindx-1]->mnf.amnf,"NAN");
data/libccp4-6.5.1/fortran/csymlib_f.c:238:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char temp_symch[80];
data/libccp4-6.5.1/fortran/csymlib_f.c:274:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char temp_symch[80];
data/libccp4-6.5.1/ccp4/ccp4_fortran.h:179:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s##_len = strlen(str);
data/libccp4-6.5.1/ccp4/ccp4_fortran.h:202:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s##_len = strlen(str);
data/libccp4-6.5.1/ccp4/ccp4_fortran.h:224:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s.len = strlen(FName);         \
data/libccp4-6.5.1/ccp4/ccp4_fortran.h:249:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s.dsc$w_length  = strlen(str);    \
data/libccp4-6.5.1/ccp4/ccp4_fortran.h:279:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s##_len = strlen(str);
data/libccp4-6.5.1/ccp4/ccp4_fortran.h:303:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s##_len = strlen(str);
data/libccp4-6.5.1/ccp4/ccp4_fortran.h:331:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s##_len = strlen(str);
data/libccp4-6.5.1/ccp4/ccp4_general.c:236:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(parent_dir, arg, dir_len);
data/libccp4-6.5.1/ccp4/ccp4_general.c:338:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      testarg = (char *) ccp4_utils_realloc(testarg,(strlen(argv[iarg])+1)*sizeof(char));
data/libccp4-6.5.1/ccp4/ccp4_general.c:362:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(testarg) == 1) {
data/libccp4-6.5.1/ccp4/ccp4_general.c:436:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(argv[ihelp]) == 1 && isdigit(argv[ihelp][0])) {
data/libccp4-6.5.1/ccp4/ccp4_general.c:499:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      env_file = (char *) ccp4_utils_malloc(sizeof(char)*(strlen(argv[ienviron])+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:629:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	line[strlen(line)-1] = '\0';
data/libccp4-6.5.1/ccp4/ccp4_general.c:659:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ccp4_utils_malloc(sizeof(char)*(strlen(env_logical_name)+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:663:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ccp4_utils_malloc(sizeof(char)*(strlen(env_file_type)+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:667:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ccp4_utils_malloc(sizeof(char)*(strlen(env_file_ext)+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:716:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      def_file = (char *) ccp4_utils_malloc(sizeof(char)*(strlen(argv[idefault])+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:844:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      line[strlen(line)-1] = '\0';
data/libccp4-6.5.1/ccp4/ccp4_general.c:903:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    logical_name = (char *) ccp4_utils_malloc((strlen(argv[iarg])+1)*sizeof(char));
data/libccp4-6.5.1/ccp4/ccp4_general.c:906:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    logical_name[strlen(argv[iarg])] = '\0';
data/libccp4-6.5.1/ccp4/ccp4_general.c:912:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      file_name = (char *) ccp4_utils_malloc((strlen(argv[iarg])+1)*sizeof(char));
data/libccp4-6.5.1/ccp4/ccp4_general.c:1029:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  while (icount<*ienv && strncmp(logical_name,envname[icount],strlen(envname[icount]))) {
data/libccp4-6.5.1/ccp4/ccp4_general.c:1049:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ccp4_utils_malloc(sizeof(char)*(strlen(logical_name)+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:1054:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ccp4_utils_malloc(sizeof(char)*(strlen("undef")+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:1061:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ccp4_utils_malloc(sizeof(char)*(strlen(file_ext)+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:1081:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lpath = strlen(file_path)-1;
data/libccp4-6.5.1/ccp4/ccp4_general.c:1087:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lext = strlen(file_ext);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1093:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lroot = strlen(file_root);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1102:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lext = strlen(envext[icount]); 
data/libccp4-6.5.1/ccp4/ccp4_general.c:1105:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(file_ext,envext[icount],(lext+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:1130:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  lpath = strlen(clibd);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1133:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(file_path,clibd,(lpath+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:1153:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  lpath = strlen(cscr);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1156:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(file_path,cscr,(lpath+1));
data/libccp4-6.5.1/ccp4/ccp4_general.c:1166:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lprognam = strlen(ccp4ProgramName(NULL));
data/libccp4-6.5.1/ccp4/ccp4_general.c:1168:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(tmpstr1,ccp4ProgramName(NULL),lprognam);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1170:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
        strncat(tmpstr1,"_",1);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1171:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(tmpstr1,file_root,lroot);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1174:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lroot = strlen(file_root);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1204:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(file_name,file_path,lname);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1218:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(file_name,".");
data/libccp4-6.5.1/ccp4/ccp4_general.c:1341:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ltmpstr = strlen(logical_name) + strlen(file_name) + 1;
data/libccp4-6.5.1/ccp4/ccp4_general.c:1341:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ltmpstr = strlen(logical_name) + strlen(file_name) + 1;
data/libccp4-6.5.1/ccp4/ccp4_general.c:1346:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(tmpstr,"=");
data/libccp4-6.5.1/ccp4/ccp4_general.c:1377:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(prog_vers_full)) {
data/libccp4-6.5.1/ccp4/ccp4_general.c:1379:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(prog_vers_str+8,prog_vers_full,10);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1387:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(prog_vers_str);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1411:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(infoline);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1417:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  npad = 51 - strlen(infoline) - strlen(prog_vers_str);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1417:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  npad = 51 - strlen(infoline) - strlen(prog_vers_str);
data/libccp4-6.5.1/ccp4/ccp4_general.c:1418:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(infoline);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:241:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(parsePtr->token[itok].word,"");
data/libccp4-6.5.1/ccp4/ccp4_parser.c:307:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ldelim = strlen(defdelim) + 1;
data/libccp4-6.5.1/ccp4/ccp4_parser.c:309:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ldelim = strlen(delim) + 1;
data/libccp4-6.5.1/ccp4/ccp4_parser.c:315:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(delimPtr,defdelim,ldelim+1);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:317:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(delimPtr,delim,ldelim+1);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:324:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      lnulldelim = strlen(defnulldelim) + 1;
data/libccp4-6.5.1/ccp4/ccp4_parser.c:326:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      lnulldelim = strlen(nulldelim) + 1;
data/libccp4-6.5.1/ccp4/ccp4_parser.c:332:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(nulldelimPtr,defnulldelim,lnulldelim+1);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:334:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(nulldelimPtr,nulldelim,lnulldelim+1);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:381:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      lcomment = strlen(def_comment_chars) + 1;
data/libccp4-6.5.1/ccp4/ccp4_parser.c:383:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      lcomment = strlen(comment_chars) + 1;
data/libccp4-6.5.1/ccp4/ccp4_parser.c:388:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(commentPtr,def_comment_chars,lcomment);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:390:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(commentPtr,comment_chars,lcomment);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:519:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  llen = strlen(line);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:699:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(tokenarray[ntok].fullstring,&line[ibeg],lword);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:709:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(tokenarray[ntok].word,&line[ibeg],lword);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:723:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  tokenarray[ntok].strlength   = strlen(tokenarray[ntok].fullstring);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:839:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(parser->keyword,"");
data/libccp4-6.5.1/ccp4/ccp4_parser.c:866:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(line)==0) {
data/libccp4-6.5.1/ccp4/ccp4_parser.c:918:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(linein,line,nchars);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:923:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    llen = strlen(linein);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:939:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(line,linein,nch);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:942:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(line,linein,nch);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:966:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  llen = strlen(tokenarray[0].fullstring);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:967:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(filename,&tokenarray[0].fullstring[1],llen);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1019:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(line) > 0) {
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1041:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      parser->keyword[strlen(tokenarray[0].word)] = '\0';
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1075:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len1 = strlen(keyin1);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1078:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len2 = strlen(keyin2);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1086:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(key1,keyin1,len1);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1089:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(key2,keyin2,4);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1108:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len2 = strlen(str2);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1120:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len2 = strlen(str2);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1141:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len1 = strlen(str1);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1142:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len2 = strlen(str2);
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1169:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (jdo<strlen(charlist) && !ismatch) {
data/libccp4-6.5.1/ccp4/ccp4_parser.c:1235:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lstr = strlen(str);
data/libccp4-6.5.1/ccp4/ccp4_program.c:42:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(programversion, progvers, MAXLEN_PROGVERSION);
data/libccp4-6.5.1/ccp4/ccp4_program.c:62:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      filename = (char *) ccp4_utils_malloc(sizeof(char)*(strlen(filepath)+strlen(vfile))+1);
data/libccp4-6.5.1/ccp4/ccp4_program.c:62:76:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      filename = (char *) ccp4_utils_malloc(sizeof(char)*(strlen(filepath)+strlen(vfile))+1);
data/libccp4-6.5.1/ccp4/ccp4_program.c:69:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           i = strlen(ccp4version)-1;
data/libccp4-6.5.1/ccp4/ccp4_program.c:124:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (ccp4_prog_vers(NULL) && strlen(ccp4_prog_vers(NULL))) 
data/libccp4-6.5.1/ccp4/ccp4_program.c:151:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(tmpstr1,rcs_string,7);
data/libccp4-6.5.1/ccp4/ccp4_program.c:153:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(tmpstr2,rcs_string,2);
data/libccp4-6.5.1/ccp4/ccp4_program.c:160:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(RCSDate,rcs_string+15,2);
data/libccp4-6.5.1/ccp4/ccp4_program.c:161:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
      strncat(RCSDate,"/",1);
data/libccp4-6.5.1/ccp4/ccp4_program.c:162:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(RCSDate,rcs_string+12,2);
data/libccp4-6.5.1/ccp4/ccp4_program.c:163:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
      strncat(RCSDate,"/",1);
data/libccp4-6.5.1/ccp4/ccp4_program.c:164:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(RCSDate,rcs_string+9,2);
data/libccp4-6.5.1/ccp4/ccp4_program.c:165:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (strlen(rcs_string) > 10 &&
data/libccp4-6.5.1/ccp4/ccp4_program.c:170:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(RCSDate,rcs_string+8,2);
data/libccp4-6.5.1/ccp4/ccp4_program.c:171:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
      strncat(RCSDate,"/",1);
data/libccp4-6.5.1/ccp4/ccp4_program.c:172:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(RCSDate,rcs_string+5,2);
data/libccp4-6.5.1/ccp4/ccp4_program.c:173:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
      strncat(RCSDate,"/",1);
data/libccp4-6.5.1/ccp4/ccp4_program.c:174:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(RCSDate,rcs_string+2,2);
data/libccp4-6.5.1/ccp4/ccp4_program.c:177:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
      strncpy(RCSDate,"",1);
data/libccp4-6.5.1/ccp4/ccp4_program.c:309:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      lpath = strlen(filepath);
data/libccp4-6.5.1/ccp4/ccp4_program.c:320:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        lpath = strlen(filepath);
data/libccp4-6.5.1/ccp4/cmap_header.c:80:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(mfile->EM_contents,"VOLU",4);
data/libccp4-6.5.1/ccp4/cmap_header.c:83:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(mfile->EM_contents,"VLST",4);
data/libccp4-6.5.1/ccp4/cmap_header.c:86:33:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    if (mfile->map_dim[2] == 1) strncpy(mfile->EM_contents,"IMAG",4);
data/libccp4-6.5.1/ccp4/cmap_header.c:87:32:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    if (mfile->map_dim[2] > 1) strncpy(mfile->EM_contents,"IMST",4);
data/libccp4-6.5.1/ccp4/cmap_labels.c:64:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(mfile->labels.labels[i]);
data/libccp4-6.5.1/ccp4/cmap_labels.c:66:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buffer,mfile->labels.labels[i],slen);
data/libccp4-6.5.1/ccp4/cmap_open.c:93:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (cfile->read) {
data/libccp4-6.5.1/ccp4/cmap_symop.c:128:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy(buffer, symop, (strlen(symop) > n_byt_symop) ?
data/libccp4-6.5.1/ccp4/cmap_symop.c:129:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         n_byt_symop : strlen(symop) );   
data/libccp4-6.5.1/ccp4/cmtzlib.c:355:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(crysin[nxtal-1]+strlen(crystal),"%d",nxtal);
data/libccp4-6.5.1/ccp4/cmtzlib.c:422:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  while (strncmp((strncpy(mkey,hdrrec,4)),"END",3) != 0) {
data/libccp4-6.5.1/ccp4/cmtzlib.c:496:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  while (strncmp((strncpy(mkey,hdrrec,4)),"END",3) != 0) {
data/libccp4-6.5.1/ccp4/cmtzlib.c:520:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
       strncpy(mtz->title,hdrrec+6,70); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:665:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  while (strncmp((strncpy(mkey,hdrrec,4)),"END",3) != 0) {
data/libccp4-6.5.1/ccp4/cmtzlib.c:693:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy( newcol->colsource, token[2].fullstring, 36 );
data/libccp4-6.5.1/ccp4/cmtzlib.c:722:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy( newcol->grpname, token[2].fullstring, 30 );
data/libccp4-6.5.1/ccp4/cmtzlib.c:724:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy( newcol->grptype, token[3].fullstring, 4 );
data/libccp4-6.5.1/ccp4/cmtzlib.c:741:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  while (strncmp((strncpy(mkey,hdrrec,4)),"END",3) != 0) {
data/libccp4-6.5.1/ccp4/cmtzlib.c:778:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(mtz->hist + MTZRECORDLENGTH*i,hdrrec,MTZRECORDLENGTH);
data/libccp4-6.5.1/ccp4/cmtzlib.c:811:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(batch->title,hdrrec+6,70); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:1088:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = (int) strlen(strcpy(title, mtz->title));
data/libccp4-6.5.1/ccp4/cmtzlib.c:1106:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(history[i],mtz->hist + MTZRECORDLENGTH*i,MTZRECORDLENGTH);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1323:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  parser = ccp4_parse_start(strlen(labin_line));
data/libccp4-6.5.1/ccp4/cmtzlib.c:1332:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ntok = ccp4_parser(labin_line, strlen(labin_line), parser, iprint);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1346:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(user_labels[j][0],"");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1347:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(user_labels[j][1],"");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1353:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(label1)>30) {
data/libccp4-6.5.1/ccp4/cmtzlib.c:1363:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(label2)>30) {
data/libccp4-6.5.1/ccp4/cmtzlib.c:1441:14:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
             strcpy(types[ilab],"R");
data/libccp4-6.5.1/ccp4/cmtzlib.c:1472:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(crystal_name,xtl->xname,63);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1474:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(dataset_name,set->dname,63);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1476:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(project_name,xtl->pname,63);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1714:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buffer,mtz->hist + MTZRECORDLENGTH*i,MTZRECORDLENGTH);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1915:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buffer,mtz->hist + MTZRECORDLENGTH*i,MTZRECORDLENGTH);
data/libccp4-6.5.1/ccp4/cmtzlib.c:1936:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(charbuf,batch->title,70); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:1937:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(charbuf+70,batch->gonlab[0],8); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:1938:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(charbuf+78,batch->gonlab[1],8); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:1939:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(charbuf+86,batch->gonlab[2],8); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:2082:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(mtz->title,ftitle,70);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2091:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = (int) strlen(mtz->title);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2100:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(mtz->title+length+1,ftitle,69-length);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2129:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     strncpy(newhist + MTZRECORDLENGTH*i,history[i]+j,MTZRECORDLENGTH-j);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2137:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(newhist + MTZRECORDLENGTH*numlines + MTZRECORDLENGTH*i,
data/libccp4-6.5.1/ccp4/cmtzlib.c:2161:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (project_name && strlen(project_name) > 0) {
data/libccp4-6.5.1/ccp4/cmtzlib.c:2162:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(xtl->pname,project_name,64);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2168:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy( path1, "/" );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2170:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat( path1, "/" );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2227:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy( path1, "/" );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2229:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat( path1, "/" );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2302:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = ( strlen(spgrnx) < MAXSPGNAMELENGTH ) ? strlen(spgrnx) : MAXSPGNAMELENGTH;
data/libccp4-6.5.1/ccp4/cmtzlib.c:2302:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = ( strlen(spgrnx) < MAXSPGNAMELENGTH ) ? strlen(spgrnx) : MAXSPGNAMELENGTH;
data/libccp4-6.5.1/ccp4/cmtzlib.c:2303:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(mtz->mtzsymm.spcgrpname,spgrnx,length);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2307:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = ( strlen(pgnamx) < MAXPGNAMELENGTH ) ? strlen(pgnamx) : MAXPGNAMELENGTH;
data/libccp4-6.5.1/ccp4/cmtzlib.c:2307:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = ( strlen(pgnamx) < MAXPGNAMELENGTH ) ? strlen(pgnamx) : MAXPGNAMELENGTH;
data/libccp4-6.5.1/ccp4/cmtzlib.c:2308:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(mtz->mtzsymm.pgname,pgnamx,length);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2423:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cbatch_len = ( strlen(charbuf) < 94 ) ? strlen(charbuf) : 94;
data/libccp4-6.5.1/ccp4/cmtzlib.c:2423:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cbatch_len = ( strlen(charbuf) < 94 ) ? strlen(charbuf) : 94;
data/libccp4-6.5.1/ccp4/cmtzlib.c:2424:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(cbatch,charbuf,cbatch_len);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2426:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(batch->title,cbatch,70); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:2427:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(batch->gonlab[0],cbatch+70,8); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:2428:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(batch->gonlab[1],cbatch+78,8); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:2429:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(batch->gonlab[2],cbatch+86,8); 
data/libccp4-6.5.1/ccp4/cmtzlib.c:2443:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy( path1, "/" );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2445:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat( path1, "/" );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2601:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy( colsource, taskenv, 36 );
data/libccp4-6.5.1/ccp4/cmtzlib.c:2609:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 for ( i = 0; i < strlen(colsource); i++ )
data/libccp4-6.5.1/ccp4/cmtzlib.c:2615:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	 strncpy(mtz->xtal[i]->set[j]->col[k]->colsource,colsource,36);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2659:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
 strncpy(hdrrec+6,mtz->title,70);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2707:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 length = strlen(mtz->mtzsymm.spcgrpname);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2709:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
 strncpy(spgname+1,mtz->mtzsymm.spcgrpname,length+1);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2787:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
	 strncpy(mtz->xtal[i]->set[j]->col[k]->type,"R",2);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2914:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     strncpy(hdrrec,mtz->hist + MTZRECORDLENGTH*i,MTZRECORDLENGTH);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2931:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     strncpy(hdrrec+6,batch->title,70);
data/libccp4-6.5.1/ccp4/cmtzlib.c:2959:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   ccp4_file_writechar(fileout,(const uint8 *)mtz->xml,strlen(mtz->xml));
data/libccp4-6.5.1/ccp4/cmtzlib.c:3456:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy( xtal->xname, xname, 64 );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3458:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy( xtal->pname, pname, 64 );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3494:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy( set->dname, dname, 64 );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3550:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy( col->label, label, 30 );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3552:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy( col->type, type, 2);
data/libccp4-6.5.1/ccp4/cmtzlib.c:3786:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(xtal->xname)+2;
data/libccp4-6.5.1/ccp4/cmtzlib.c:3788:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy( path, "/" );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3801:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(path1)+strlen(set->dname)+2;
data/libccp4-6.5.1/ccp4/cmtzlib.c:3801:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(path1)+strlen(set->dname)+2;
data/libccp4-6.5.1/ccp4/cmtzlib.c:3805:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat( path, "/" );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3818:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(path1)+strlen(col->label)+2;
data/libccp4-6.5.1/ccp4/cmtzlib.c:3818:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(path1)+strlen(col->label)+2;
data/libccp4-6.5.1/ccp4/cmtzlib.c:3822:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat( path, "/" );
data/libccp4-6.5.1/ccp4/cmtzlib.c:3833:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for ( i = j = 0; i < strlen(partial); i++ ) if ( partial[i] == '/' ) j++;
data/libccp4-6.5.1/ccp4/cmtzlib.c:3835:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy( path, "");
data/libccp4-6.5.1/ccp4/cmtzlib.c:3836:22:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  if ( j++ < njust ) strcat( path, "/" );
data/libccp4-6.5.1/ccp4/csymlib.c:148:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    symopfile = ccp4_utils_malloc((strlen(ccp4dir)+22)*sizeof(char));
data/libccp4-6.5.1/ccp4/csymlib.c:150:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    symopfile[strlen(ccp4dir)+21] = '\0';
data/libccp4-6.5.1/ccp4/csymlib.c:184:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(filerec) > 1){
data/libccp4-6.5.1/ccp4/csymlib.c:185:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (filerec[strlen(filerec)-2]=='\r') {
data/libccp4-6.5.1/ccp4/csymlib.c:186:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        filerec[strlen(filerec)-2]='\n';
data/libccp4-6.5.1/ccp4/csymlib.c:187:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        filerec[strlen(filerec)-1]='\0';
data/libccp4-6.5.1/ccp4/csymlib.c:191:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(filerec) > 1) {
data/libccp4-6.5.1/ccp4/csymlib.c:284:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             symop_to_mat4(sg_cenop[i],sg_cenop[i]+strlen(sg_cenop[i]),cent_ops[0]);
data/libccp4-6.5.1/ccp4/csymlib.c:286:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              symop_to_mat4(sg_symop[j],sg_symop[j]+strlen(sg_symop[j]),rot2[0]);
data/libccp4-6.5.1/ccp4/csymlib.c:347:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spacegroup->crystal," ");
data/libccp4-6.5.1/ccp4/csymlib.c:356:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  symop_to_mat4(sg_basisop,sg_basisop+strlen(sg_basisop),sg_chb[0]);
data/libccp4-6.5.1/ccp4/csymlib.c:386:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    symop_to_mat4(sg_cenop[i],sg_cenop[i]+strlen(sg_cenop[i]),cent_ops[0]);
data/libccp4-6.5.1/ccp4/csymlib.c:388:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     strncpy(filerec,sg_symop[j],80);   /* symop_to_mat4 overwrites later sg_symop */
data/libccp4-6.5.1/ccp4/csymlib.c:389:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     symop_to_mat4(filerec,filerec+strlen(filerec),rot2[0]);
data/libccp4-6.5.1/ccp4/csymlib.c:698:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(symop) == 1 && symop[0] == '*') {
data/libccp4-6.5.1/ccp4/csymlib.c:703:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(symopbuf)+strlen(symop)+1 <= MAXLENSYMOPSTR) {
data/libccp4-6.5.1/ccp4/csymlib.c:703:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(symopbuf)+strlen(symop)+1 <= MAXLENSYMOPSTR) {
data/libccp4-6.5.1/ccp4/csymlib.c:717:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (got_symop && strlen(symopbuf) > 0) {
data/libccp4-6.5.1/ccp4/csymlib.c:719:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!symop_to_mat4(&(symopbuf[0]),&(symopbuf[0])+strlen(symopbuf),tmp_rot[0])) {
data/libccp4-6.5.1/ccp4/csymlib.c:1819:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = 0 ; i < strlen(range) ; ++i) {
data/libccp4-6.5.1/ccp4/csymlib.c:1864:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (equal) limits[1] += 2.0*delta;        
data/libccp4-6.5.1/ccp4/library_file.c:314:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    result = read (cfile->fd, buffer, n_items);
data/libccp4-6.5.1/ccp4/library_file.c:556:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return (cfile->read);
data/libccp4-6.5.1/ccp4/library_file.c:901:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (cfile->read && cfile->write) openflags = (O_RDWR | O_CREAT);
data/libccp4-6.5.1/ccp4/library_file.c:930:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (cfile->read) *mptr++ = '+';
data/libccp4-6.5.1/ccp4/library_file.c:932:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (cfile->read && cfile->write) {
data/libccp4-6.5.1/ccp4/library_file.c:1166:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( !cfile->read || cfile->iostat) {
data/libccp4-6.5.1/ccp4/library_file.c:1263:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( !cfile->read || cfile->iostat) {
data/libccp4-6.5.1/ccp4/library_file.c:1321:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!cfile->read || cfile->iostat) {
data/libccp4-6.5.1/ccp4/library_file.c:1417:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( !cfile->read || cfile->iostat) {
data/libccp4-6.5.1/ccp4/library_file.c:1477:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!cfile->read || cfile->iostat) {
data/libccp4-6.5.1/ccp4/library_file.c:1533:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!cfile->read || cfile->iostat) {
data/libccp4-6.5.1/ccp4/library_file.c:2160:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen (message) + strlen (cfile->name) + 1;
data/libccp4-6.5.1/ccp4/library_file.c:2160:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen (message) + strlen (cfile->name) + 1;
data/libccp4-6.5.1/ccp4/library_file.c:2211:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((msg_end - msg_curr) > strlen(cfile->name)) {
data/libccp4-6.5.1/ccp4/library_file.c:2229:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  } else if (cfile->read && cfile->write) {
data/libccp4-6.5.1/ccp4/library_file.h:43:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  unsigned int read : 1;
data/libccp4-6.5.1/ccp4/library_utils.c:147:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( (param = (char *) ccp4_utils_malloc( (strlen(str)+1)*sizeof(char) )) == NULL) {
data/libccp4-6.5.1/ccp4/library_utils.c:158:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( (param1 = (char *) ccp4_utils_malloc( (strlen(str)+1)*sizeof(char) )) == NULL) {
data/libccp4-6.5.1/ccp4/library_utils.c:294:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  switch (strlen(cmode)) {
data/libccp4-6.5.1/ccp4/library_utils.c:452:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for ( i = strlen(filename)-1; i >= 0; i-- ) {
data/libccp4-6.5.1/ccp4/library_utils.c:458:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(filename) - indx1;
data/libccp4-6.5.1/ccp4/library_utils.c:461:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for ( i = strlen(filename)-1; i >= (indx1 < 0 ? 0 : indx1) ; i-- ) {
data/libccp4-6.5.1/ccp4/library_utils.c:468:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(basename,filename+indx1+1,length-1);
data/libccp4-6.5.1/ccp4/library_utils.c:483:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for ( i = strlen(filename)-1; i >= 0; i-- ) {
data/libccp4-6.5.1/ccp4/library_utils.c:491:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pathname,filename,length-1);
data/libccp4-6.5.1/ccp4/library_utils.c:506:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for ( i = strlen(filename)-1; i >= 0; i-- ) {
data/libccp4-6.5.1/ccp4/library_utils.c:509:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      length = strlen(filename) - indx1;
data/libccp4-6.5.1/ccp4/library_utils.c:518:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(extension,filename+indx1+1,length-1);
data/libccp4-6.5.1/ccp4/library_utils.c:534:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lendir = strlen(dir);
data/libccp4-6.5.1/ccp4/library_utils.c:535:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lenfile = strlen(file);
data/libccp4-6.5.1/ccp4/library_utils.c:543:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(join,dir,lendir);
data/libccp4-6.5.1/ccp4/library_utils.c:546:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(join,file,lenfile);
data/libccp4-6.5.1/ccp4/pack_c.c:1042:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((header[i] = c = getc(packfile)) == '\n')
data/libccp4-6.5.1/ccp4/pack_c.c:1085:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((header[i] = c = getc(packfile)) == '\n')
data/libccp4-6.5.1/ccp4/pack_c.c:1123:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      { spill = (LONG) getc(packfile);
data/libccp4-6.5.1/ccp4/pack_c.c:1144:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  { spill = (LONG) getc(packfile);
data/libccp4-6.5.1/ccp4/pack_c.c:1196:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      { spill = (LONG) getc(packfile);
data/libccp4-6.5.1/ccp4/pack_c.c:1217:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  { spill = (LONG) getc(packfile);
data/libccp4-6.5.1/ccp4/pack_c.c:1268:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      { spill = (LONG) getc(packfile);
data/libccp4-6.5.1/ccp4/pack_c.c:1289:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  { spill = (LONG) getc(packfile);
data/libccp4-6.5.1/ccp4/pack_c.c:1340:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      { spill = (LONG) getc(packfile);
data/libccp4-6.5.1/ccp4/pack_c.c:1361:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  { spill = (LONG) getc(packfile);
data/libccp4-6.5.1/ccp4/pack_c.c:1432:30:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      { if ((header[i] = c = getc(packfile)) == '\n')
data/libccp4-6.5.1/ccp4/vmslibrary.c:62:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy (name, path->dsc$a_pointer, Length);
data/libccp4-6.5.1/ccp4/vmslibrary.c:90:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy (name, path->dsc$a_pointer, Length);
data/libccp4-6.5.1/fortran/ccp4_diskio_f.c:718:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(FTN_STR(filename), _ioChannels[*istrm]->iobj->name,
data/libccp4-6.5.1/fortran/ccp4_diskio_f.c:719:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    MIN(strlen(_ioChannels[*istrm]->iobj->name), 
data/libccp4-6.5.1/fortran/ccp4_general_f.c:171:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string3 = (char *) ccp4_utils_malloc((strlen(string2)+1)*sizeof(char));
data/libccp4-6.5.1/fortran/ccp4_general_f.c:173:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string3[strlen(string3)] = '\0';
data/libccp4-6.5.1/fortran/ccp4_general_f.c:190:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string3 = (char *) ccp4_utils_malloc((strlen(string2)+1)*sizeof(char));
data/libccp4-6.5.1/fortran/ccp4_general_f.c:192:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string3[strlen(string3)] = '\0';
data/libccp4-6.5.1/fortran/ccp4_general_f.c:212:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp_errstr,errstr,length);
data/libccp4-6.5.1/fortran/ccp4_general_f.c:431:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string = (char *) ccp4_utils_realloc(string,strlen(string1)+1);
data/libccp4-6.5.1/fortran/ccp4_parser_f.c:115:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(fstr,cstr,lfstr);
data/libccp4-6.5.1/fortran/ccp4_parser_f.c:116:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(cstr) < lfstr) {
data/libccp4-6.5.1/fortran/ccp4_parser_f.c:117:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i=strlen(cstr); i<lfstr; i++) fstr[i] = ' ';
data/libccp4-6.5.1/fortran/ccp4_parser_f.c:262:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ndelim = strlen(new_delimiters) + 1;
data/libccp4-6.5.1/fortran/ccp4_parser_f.c:265:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(delimiters,new_delimiters,ndelim);
data/libccp4-6.5.1/fortran/ccp4_parser_f.c:276:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ndelim = strlen(new_nulldelimiters) + 1;
data/libccp4-6.5.1/fortran/ccp4_parser_f.c:279:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(nulldelimiters,new_nulldelimiters,ndelim);
data/libccp4-6.5.1/fortran/ccp4_parser_f.c:345:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(cline,FTN_STR(line),lline);
data/libccp4-6.5.1/fortran/ccp4_parser_f.c:558:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(delim,newdlm,*nnewdl);
data/libccp4-6.5.1/fortran/ccp4_parser_f.c:567:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(nulldelim,&(newdlm[*nspecd]),nnulldl);
data/libccp4-6.5.1/fortran/cmaplib_f.c:713:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(title,temp_title,MIN(strlen(temp_title),FTN_LEN(title)));
data/libccp4-6.5.1/fortran/cmaplib_f.c:713:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncpy(title,temp_title,MIN(strlen(temp_title),FTN_LEN(title)));
data/libccp4-6.5.1/fortran/cmaplib_f.c:781:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(title,temp_title,MIN(strlen(temp_title),FTN_LEN(title)));
data/libccp4-6.5.1/fortran/cmaplib_f.c:781:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncpy(title,temp_title,MIN(strlen(temp_title),FTN_LEN(title)));
data/libccp4-6.5.1/fortran/cmaplib_f.c:917:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(title,temp_title,MIN(strlen(temp_title),FTN_LEN(title)));
data/libccp4-6.5.1/fortran/cmaplib_f.c:917:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncpy(title,temp_title,MIN(strlen(temp_title),FTN_LEN(title)));
data/libccp4-6.5.1/fortran/cmaplib_f.c:2110:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(FTN_STR(logname), ioArray[last_Write]->logname, 
data/libccp4-6.5.1/fortran/cmaplib_f.c:2111:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  MIN(strlen(ioArray[last_Write]->logname),
data/libccp4-6.5.1/fortran/cmaplib_f.c:2122:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(FTN_STR(logname), ioArray[last_Write]->logname, 
data/libccp4-6.5.1/fortran/cmaplib_f.c:2123:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  MIN(strlen(ioArray[last_Write]->logname),
data/libccp4-6.5.1/fortran/cmaplib_f.c:2138:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(FTN_STR(logname), ioArray[last_Read]->logname, 
data/libccp4-6.5.1/fortran/cmaplib_f.c:2139:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  MIN(strlen(ioArray[last_Read]->logname),
data/libccp4-6.5.1/fortran/cmaplib_f.c:2150:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(FTN_STR(logname), ioArray[last_Read]->logname, 
data/libccp4-6.5.1/fortran/cmaplib_f.c:2151:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  MIN(strlen(ioArray[last_Read]->logname),
data/libccp4-6.5.1/fortran/cmaplib_f.c:2163:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy((char *)map, "MAP ", strlen("MAP "));
data/libccp4-6.5.1/fortran/cmaplib_f.c:2163:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncpy((char *)map, "MAP ", strlen("MAP "));
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1349:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(btitle,cbatch,70);
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1357:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(batch->title,cbatch,70); 
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1358:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(batch->gonlab[0],cbatch+70,8); 
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1359:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(batch->gonlab[1],cbatch+78,8); 
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1360:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(batch->gonlab[2],cbatch+86,8); 
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1448:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
 strncpy(tbatch,cbatch,70);
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1679:8:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
       strncat(err_str,fullfilename,245);
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1692:6:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
     strncat(err_str,temp_name,260);
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1837:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(strcpy(hline+5,ccp4ProgramName(NULL))) + 5;
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1841:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = len + strlen(strcpy(hline+len,date));
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1845:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = len + strlen(strcpy(hline+len,time));
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1854:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 Length = strlen(temp_hstrng);
data/libccp4-6.5.1/fortran/cmtzlib_f.c:1856:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
 strncpy(hline+len,temp_hstrng,Length);
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2085:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(crystal_name+i*(pname_len+1),
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2108:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (strlen(crystal_name+i*(pname_len+1)) && 
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2109:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(dataset_name+i*(dname_len+1))) {
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2186:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (strlen(crystal_name+i*(xname_len+1)) && 
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2187:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(dataset_name+i*(dname_len+1))) {
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2225:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(crystal_name) && strlen(dataset_name)) {
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2225:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(crystal_name) && strlen(dataset_name)) {
data/libccp4-6.5.1/fortran/cmtzlib_f.c:2613:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
 strncpy(cbatch,FTN_STR(tbatch),length);
data/libccp4-6.5.1/fortran/csymlib_f.c:768:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(temp_name)) {
data/libccp4-6.5.1/fortran/csymlib_f.c:1074:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(temp_name)) {
data/libccp4-6.5.1/fortran/csymlib_f.c:1092:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(spacegroup->symbol_xHM) > 0) {
data/libccp4-6.5.1/fortran/csymlib_f.c:1093:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      no_colon_name = (char *) ccp4_utils_malloc((strlen(spacegroup->symbol_xHM)+1)*sizeof(char));
data/libccp4-6.5.1/fortran/csymlib_f.c:1097:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      no_colon_name = (char *) ccp4_utils_malloc((strlen(spacegroup->symbol_old)+1)*sizeof(char));
data/libccp4-6.5.1/fortran/csymlib_f.c:1103:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (strlen(spacegroup->symbol_old) > 0) {
data/libccp4-6.5.1/fortran/csymlib_f.c:1104:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      shortname = (char *) ccp4_utils_malloc((strlen(spacegroup->symbol_old)+1)*sizeof(char));
data/libccp4-6.5.1/fortran/csymlib_f.c:1109:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (strlen(no_colon_name) > 0) {
data/libccp4-6.5.1/fortran/csymlib_f.c:1110:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      shortname = (char *) ccp4_utils_malloc((strlen(no_colon_name)+1)*sizeof(char));
data/libccp4-6.5.1/fortran/library_f.c:122:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  if(length) strncpy(str2, FTN_STR(str1), length); 
data/libccp4-6.5.1/fortran/library_f.c:142:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  } else if (str1_len > strlen(cstring)) {
data/libccp4-6.5.1/fortran/library_f.c:144:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = strlen(cstring); i < str1_len; ++i) 
data/libccp4-6.5.1/fortran/library_f.c:147:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(FTN_STR(str1),cstring,str1_len);
data/libccp4-6.5.1/fortran/library_f.c:203:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int s_len = strlen(s);
data/libccp4-6.5.1/fortran/library_f.c:629:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void) strncpy (str, strerror (errno), Lstr);
data/libccp4-6.5.1/fortran/library_f.c:630:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = strlen (str); i < Lstr; i++) str[i] = ' ';  /* pad with spaces */
data/libccp4-6.5.1/fortran/library_f.c:692:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void) strncpy (str, strerror (errno), Lstr);
data/libccp4-6.5.1/fortran/library_f.c:693:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = strlen (str); i < Lstr; i++) str[i] = ' ';  /* pad with spaces */
data/libccp4-6.5.1/fortran/library_f.c:716:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void) strncpy (str, strerror (errno), Lstr);
data/libccp4-6.5.1/fortran/library_f.c:717:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = strlen (str); i < Lstr; i++) str[i] = ' ';  /* pad with spaces */
data/libccp4-6.5.1/fortran/library_f.c:757:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void) strncpy (str, strerror (errno), Lstr);
data/libccp4-6.5.1/fortran/library_f.c:758:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = strlen (str); i < Lstr; i++) str[i] = ' ';  /* pad with spaces */
data/libccp4-6.5.1/fortran/library_f.c:840:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  str = strncpy( str, cmd, cmd_len);

ANALYSIS SUMMARY:

Hits = 960
Lines analyzed = 31884 in approximately 1.12 seconds (28462 lines/second)
Physical Source Lines of Code (SLOC) = 19096
Hits@level = [0] 640 [1] 343 [2] 412 [3]  48 [4] 154 [5]   3
Hits@level+ = [0+] 1600 [1+] 960 [2+] 617 [3+] 205 [4+] 157 [5+]   3
Hits/KSLOC@level+ = [0+] 83.7872 [1+] 50.2723 [2+] 32.3104 [3+] 10.7352 [4+] 8.22162 [5+] 0.157101
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.