Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/libntru-0.5/src/arith.c Examining data/libntru-0.5/src/arith.h Examining data/libntru-0.5/src/bench.c Examining data/libntru-0.5/src/bitstring.c Examining data/libntru-0.5/src/bitstring.h Examining data/libntru-0.5/src/encparams.c Examining data/libntru-0.5/src/encparams.h Examining data/libntru-0.5/src/err.h Examining data/libntru-0.5/src/hash.c Examining data/libntru-0.5/src/hash.h Examining data/libntru-0.5/src/hybrid.c Examining data/libntru-0.5/src/idxgen.c Examining data/libntru-0.5/src/idxgen.h Examining data/libntru-0.5/src/key.c Examining data/libntru-0.5/src/key.h Examining data/libntru-0.5/src/md_helper.c Examining data/libntru-0.5/src/md_helper.h Examining data/libntru-0.5/src/mgf.c Examining data/libntru-0.5/src/mgf.h Examining data/libntru-0.5/src/nist_aes_rijndael.h Examining data/libntru-0.5/src/nist_config.h Examining data/libntru-0.5/src/nist_ctr_drbg.c Examining data/libntru-0.5/src/nist_ctr_drbg.h Examining data/libntru-0.5/src/nist_ctr_drbg_aes256.h Examining data/libntru-0.5/src/ntru.c Examining data/libntru-0.5/src/ntru.h Examining data/libntru-0.5/src/poly.c Examining data/libntru-0.5/src/poly.h Examining data/libntru-0.5/src/rand.c Examining data/libntru-0.5/src/rand.h Examining data/libntru-0.5/src/rijndael.c Examining data/libntru-0.5/src/rijndael.h Examining data/libntru-0.5/src/sha1.c Examining data/libntru-0.5/src/sha2.c Examining data/libntru-0.5/src/sph_sha1.h Examining data/libntru-0.5/src/sph_sha2.h Examining data/libntru-0.5/src/sph_types.h Examining data/libntru-0.5/src/types.h Examining data/libntru-0.5/src/ntru_endian.h Examining data/libntru-0.5/tests/test.c Examining data/libntru-0.5/tests/test_bitstring.c Examining data/libntru-0.5/tests/test_bitstring.h Examining data/libntru-0.5/tests/test_hash.c Examining data/libntru-0.5/tests/test_hash.h Examining data/libntru-0.5/tests/test_idxgen.c Examining data/libntru-0.5/tests/test_idxgen.h Examining data/libntru-0.5/tests/test_key.c Examining data/libntru-0.5/tests/test_key.h Examining data/libntru-0.5/tests/test_ntru.c Examining data/libntru-0.5/tests/test_ntru.h Examining data/libntru-0.5/tests/test_poly.c Examining data/libntru-0.5/tests/test_poly.h Examining data/libntru-0.5/tests/test_util.c Examining data/libntru-0.5/tests/test_util.h Examining data/libntru-0.5/debian/tests/example1.c FINAL RESULTS: data/libntru-0.5/src/hybrid.c:115:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(strcmp((char*)plain, (char*)dec)==0 ? "successful\n" : "failed\n"); data/libntru-0.5/src/key.c:255:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(params->name, all[i].name); data/libntru-0.5/tests/test_idxgen.c:17:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(rs); data/libntru-0.5/tests/test_util.c:90:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(0); data/libntru-0.5/debian/tests/example1.c:26:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(seed, "my test password"); data/libntru-0.5/debian/tests/example1.c:36:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(msg, "whatever"); data/libntru-0.5/src/bitstring.c:27:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&b->buf, &a->buf, sizeof b->buf); data/libntru-0.5/src/encparams.h:19:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[11]; data/libntru-0.5/src/hash.c:133:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, data_[i], len); data/libntru-0.5/src/hash.c:176:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, data_[i], len); data/libntru-0.5/src/hash.c:373:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, data_[i], len); data/libntru-0.5/src/hash.c:416:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, data_[i], len); data/libntru-0.5/src/hybrid.c:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char plain_char[123]; data/libntru-0.5/src/hybrid.c:84:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(plain_char, "This text is too long to fit in a NTRU message, so we'll use " \ data/libntru-0.5/src/idxgen.c:30:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&hash_inp_arr[j], (uint8_t*)s->Z, s->zlen); data/libntru-0.5/src/idxgen.c:32:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uint8_t*)&hash_inp_arr[j] + s->zlen, &counter_endian, sizeof s->counter); data/libntru-0.5/src/idxgen.c:51:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&hash_inp_arr[j], (uint8_t*)s->Z, s->zlen); data/libntru-0.5/src/idxgen.c:53:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uint8_t*)&hash_inp_arr[j] + s->zlen, &counter_endian, sizeof s->counter); data/libntru-0.5/src/idxgen.c:68:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&hash_inp, (uint8_t*)s->Z, s->zlen); data/libntru-0.5/src/idxgen.c:70:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uint8_t*)&hash_inp + s->zlen, &counter_endian, sizeof s->counter); data/libntru-0.5/src/idxgen.c:93:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&hash_inp, (uint8_t*)s->Z, s->zlen); data/libntru-0.5/src/idxgen.c:95:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uint8_t*)&hash_inp + s->zlen, &counter_endian, sizeof s->counter); data/libntru-0.5/src/key.c:18:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arr, &N_endian, sizeof N_endian); data/libntru-0.5/src/key.c:23:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arr, &q_endian, sizeof q_endian); data/libntru-0.5/src/key.c:35:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&N_endian, arr_head, sizeof N_endian); data/libntru-0.5/src/key.c:42:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&q_endian, arr_head, sizeof q_endian); data/libntru-0.5/src/key.c:63:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arr_head, &num_ones, sizeof num_ones); data/libntru-0.5/src/key.c:66:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arr_head, &num_neg_ones, sizeof num_neg_ones); data/libntru-0.5/src/key.c:115:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arr_head, &N_endian, sizeof N_endian); data/libntru-0.5/src/key.c:120:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arr_head, &q_endian, sizeof q_endian); data/libntru-0.5/src/key.c:147:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&num_ones, arr_head, sizeof num_ones); data/libntru-0.5/src/key.c:151:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&num_neg_ones, arr_head, sizeof num_neg_ones); data/libntru-0.5/src/key.c:188:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&N, arr, sizeof N); data/libntru-0.5/src/key.c:194:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&q, arr, sizeof q); data/libntru-0.5/src/key.c:268:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(params->oid, all[i].oid, sizeof(all[i].oid)); data/libntru-0.5/src/md_helper.c:149:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sc->buf + current, data, clen); data/libntru-0.5/src/md_helper.c:211:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sc->buf, data, len); data/libntru-0.5/src/md_helper.h:149:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sc->buf + current, data, clen); data/libntru-0.5/src/md_helper.h:211:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sc->buf, data, len); data/libntru-0.5/src/mgf.c:279:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&hash_inp_arr[j], Z, sizeof Z); data/libntru-0.5/src/mgf.c:280:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uint8_t*)&hash_inp_arr[j] + sizeof Z, &counter_endian, sizeof counter_endian); data/libntru-0.5/src/mgf.c:305:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&hash_inp_arr[j], Z, sizeof Z); data/libntru-0.5/src/mgf.c:306:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uint8_t*)&hash_inp_arr[j] + sizeof Z, &counter_endian, sizeof counter_endian); data/libntru-0.5/src/mgf.c:325:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&hash_inp, Z, sizeof Z); data/libntru-0.5/src/mgf.c:326:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uint8_t*)&hash_inp + sizeof Z, &counter_endian, sizeof counter_endian); data/libntru-0.5/src/mgf.c:344:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&i->coeffs[cur], NTRU_MGF_TRIT_TBL[O], 10); /* copy 5 uint16_t's */ data/libntru-0.5/src/mgf.c:353:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&hash_inp, Z, sizeof Z); data/libntru-0.5/src/mgf.c:354:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uint8_t*)&hash_inp + hlen, &counter, sizeof counter); data/libntru-0.5/src/mgf.c:356:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf, &H, hlen); data/libntru-0.5/src/nist_ctr_drbg.c:34:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char nist_cipher_df_encrypted_iv[NIST_BLOCK_SEEDLEN / NIST_BLOCK_OUTLEN][NIST_BLOCK_OUTLEN_BYTES]; data/libntru-0.5/src/nist_ctr_drbg.c:117:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char S[NIST_BLOCK_OUTLEN_BYTES]; data/libntru-0.5/src/nist_ctr_drbg.c:159:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&S[index], input_string, len); data/libntru-0.5/src/nist_ctr_drbg.c:188:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&S[0], input_string, NIST_BLOCK_OUTLEN_BYTES); data/libntru-0.5/src/nist_ctr_drbg.c:202:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&S[0], input_string, input_string_length); data/libntru-0.5/src/nist_ctr_drbg.c:258:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp[0], &nist_cipher_df_encrypted_iv[j][0], NIST_BLOCK_OUTLEN_BYTES); data/libntru-0.5/src/nist_ctr_drbg.c:297:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(output_string, output_buffer, N); data/libntru-0.5/src/nist_ctr_drbg.c:309:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char K[NIST_BLOCK_KEYLEN_BYTES]; data/libntru-0.5/src/nist_ctr_drbg.c:392:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *input_string[3]; data/libntru-0.5/src/nist_ctr_drbg.c:433:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char K[NIST_BLOCK_KEYLEN_BYTES]; data/libntru-0.5/src/nist_ctr_drbg.c:453:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *input_string[2]; data/libntru-0.5/src/nist_ctr_drbg.c:507:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *input_string[1]; data/libntru-0.5/src/nist_ctr_drbg.c:559:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, temp, len); data/libntru-0.5/src/ntru.c:296:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&htrunc, &bh, pklen/8); data/libntru-0.5/src/ntru.c:300:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seed, ¶ms->oid, oid_len); data/libntru-0.5/src/ntru.c:302:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seed, msg, msg_len); data/libntru-0.5/src/ntru.c:304:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seed, b, blen); data/libntru-0.5/src/ntru.c:306:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seed, &htrunc, pklen/8); data/libntru-0.5/src/ntru.c:392:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&M, &b, db/8); data/libntru-0.5/src/ntru.c:396:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(M_head, msg, msg_len); data/libntru-0.5/src/ntru.c:483:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb, cM_head, blen); data/libntru-0.5/src/ntru.c:493:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dec, cM_head, cl); data/libntru-0.5/src/poly.c:192:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c, z0, 2*(2*len2-1)); /* 2*len2-1 coefficients */ data/libntru-0.5/src/poly.c:310:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c, z0, 2*(2*len2-1)); /* 2*len2-1 coefficients */ data/libntru-0.5/src/poly.c:1152:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&a64[i], &last, enc_last_int_valid); data/libntru-0.5/src/poly.c:1203:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&a32[i], &last, enc_last_int_valid); data/libntru-0.5/src/poly.c:1275:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&a[a_idx], a_last, ((N-p_idx)*11+7)/8); data/libntru-0.5/src/poly.c:1644:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp2, Fq, sizeof *Fq); data/libntru-0.5/src/rand.c:27:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rand_ctx->seed, seed, seed_len); data/libntru-0.5/src/rand.c:76:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int rand_fd = open(filename, O_RDONLY); data/libntru-0.5/src/rand.c:166:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int rand_fd = open("/dev/urandom", O_RDONLY); data/libntru-0.5/src/sha1.c:328:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. sha1_round(const unsigned char *data, sph_u32 r[5]) data/libntru-0.5/src/sha1.c:342:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sc->val, IV, sizeof IV); data/libntru-0.5/src/sha2.c:609:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. sha2_round(const unsigned char *data, sph_u32 r[8]) data/libntru-0.5/src/sha2.c:623:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sc->val, H224, sizeof H224); data/libntru-0.5/src/sha2.c:638:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sc->val, H256, sizeof H256); data/libntru-0.5/src/sph_sha1.h:65:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[64]; /* first field, for alignment */ data/libntru-0.5/src/sph_sha2.h:68:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[64]; /* first field, for alignment */ data/libntru-0.5/src/sph_sha2.h:232:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[128]; /* first field, for alignment */ data/libntru-0.5/src/sph_types.h:1335:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = (val >> 8); data/libntru-0.5/src/sph_types.h:1336:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = val; data/libntru-0.5/src/sph_types.h:1342:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return ((unsigned)(((const unsigned char *)src)[0]) << 8) data/libntru-0.5/src/sph_types.h:1343:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | (unsigned)(((const unsigned char *)src)[1]); data/libntru-0.5/src/sph_types.h:1349:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = val; data/libntru-0.5/src/sph_types.h:1350:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = val >> 8; data/libntru-0.5/src/sph_types.h:1356:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (unsigned)(((const unsigned char *)src)[0]) data/libntru-0.5/src/sph_types.h:1357:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((unsigned)(((const unsigned char *)src)[1]) << 8); data/libntru-0.5/src/sph_types.h:1382:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = (val >> 24); data/libntru-0.5/src/sph_types.h:1383:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 16); data/libntru-0.5/src/sph_types.h:1384:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 8); data/libntru-0.5/src/sph_types.h:1385:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = val; data/libntru-0.5/src/sph_types.h:1389:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = (val >> 24); data/libntru-0.5/src/sph_types.h:1390:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 16); data/libntru-0.5/src/sph_types.h:1391:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 8); data/libntru-0.5/src/sph_types.h:1392:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = val; data/libntru-0.5/src/sph_types.h:1411:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = (val >> 24); data/libntru-0.5/src/sph_types.h:1412:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 16); data/libntru-0.5/src/sph_types.h:1413:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 8); data/libntru-0.5/src/sph_types.h:1414:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = val; data/libntru-0.5/src/sph_types.h:1442:44: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return ((sph_u32)(((const unsigned char *)src)[0]) << 24) data/libntru-0.5/src/sph_types.h:1443:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[1]) << 16) data/libntru-0.5/src/sph_types.h:1444:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[2]) << 8) data/libntru-0.5/src/sph_types.h:1445:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | (sph_u32)(((const unsigned char *)src)[3]); data/libntru-0.5/src/sph_types.h:1449:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return ((sph_u32)(((const unsigned char *)src)[0]) << 24) data/libntru-0.5/src/sph_types.h:1450:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[1]) << 16) data/libntru-0.5/src/sph_types.h:1451:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[2]) << 8) data/libntru-0.5/src/sph_types.h:1452:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | (sph_u32)(((const unsigned char *)src)[3]); data/libntru-0.5/src/sph_types.h:1471:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return ((sph_u32)(((const unsigned char *)src)[0]) << 24) data/libntru-0.5/src/sph_types.h:1472:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[1]) << 16) data/libntru-0.5/src/sph_types.h:1473:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[2]) << 8) data/libntru-0.5/src/sph_types.h:1474:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | (sph_u32)(((const unsigned char *)src)[3]); data/libntru-0.5/src/sph_types.h:1500:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = val; data/libntru-0.5/src/sph_types.h:1501:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 8); data/libntru-0.5/src/sph_types.h:1502:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 16); data/libntru-0.5/src/sph_types.h:1503:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = (val >> 24); data/libntru-0.5/src/sph_types.h:1507:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = val; data/libntru-0.5/src/sph_types.h:1508:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 8); data/libntru-0.5/src/sph_types.h:1509:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 16); data/libntru-0.5/src/sph_types.h:1510:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = (val >> 24); data/libntru-0.5/src/sph_types.h:1529:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = val; data/libntru-0.5/src/sph_types.h:1530:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 8); data/libntru-0.5/src/sph_types.h:1531:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 16); data/libntru-0.5/src/sph_types.h:1532:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = (val >> 24); data/libntru-0.5/src/sph_types.h:1593:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (sph_u32)(((const unsigned char *)src)[0]) data/libntru-0.5/src/sph_types.h:1594:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[1]) << 8) data/libntru-0.5/src/sph_types.h:1595:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[2]) << 16) data/libntru-0.5/src/sph_types.h:1596:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[3]) << 24); data/libntru-0.5/src/sph_types.h:1600:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (sph_u32)(((const unsigned char *)src)[0]) data/libntru-0.5/src/sph_types.h:1601:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[1]) << 8) data/libntru-0.5/src/sph_types.h:1602:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[2]) << 16) data/libntru-0.5/src/sph_types.h:1603:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[3]) << 24); data/libntru-0.5/src/sph_types.h:1638:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (sph_u32)(((const unsigned char *)src)[0]) data/libntru-0.5/src/sph_types.h:1639:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[1]) << 8) data/libntru-0.5/src/sph_types.h:1640:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[2]) << 16) data/libntru-0.5/src/sph_types.h:1641:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u32)(((const unsigned char *)src)[3]) << 24); data/libntru-0.5/src/sph_types.h:1669:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = (val >> 56); data/libntru-0.5/src/sph_types.h:1670:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 48); data/libntru-0.5/src/sph_types.h:1671:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 40); data/libntru-0.5/src/sph_types.h:1672:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = (val >> 32); data/libntru-0.5/src/sph_types.h:1673:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[4] = (val >> 24); data/libntru-0.5/src/sph_types.h:1674:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[5] = (val >> 16); data/libntru-0.5/src/sph_types.h:1675:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[6] = (val >> 8); data/libntru-0.5/src/sph_types.h:1676:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[7] = val; data/libntru-0.5/src/sph_types.h:1680:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = (val >> 56); data/libntru-0.5/src/sph_types.h:1681:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 48); data/libntru-0.5/src/sph_types.h:1682:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 40); data/libntru-0.5/src/sph_types.h:1683:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = (val >> 32); data/libntru-0.5/src/sph_types.h:1684:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[4] = (val >> 24); data/libntru-0.5/src/sph_types.h:1685:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[5] = (val >> 16); data/libntru-0.5/src/sph_types.h:1686:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[6] = (val >> 8); data/libntru-0.5/src/sph_types.h:1687:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[7] = val; data/libntru-0.5/src/sph_types.h:1706:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = (val >> 56); data/libntru-0.5/src/sph_types.h:1707:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 48); data/libntru-0.5/src/sph_types.h:1708:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 40); data/libntru-0.5/src/sph_types.h:1709:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = (val >> 32); data/libntru-0.5/src/sph_types.h:1710:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[4] = (val >> 24); data/libntru-0.5/src/sph_types.h:1711:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[5] = (val >> 16); data/libntru-0.5/src/sph_types.h:1712:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[6] = (val >> 8); data/libntru-0.5/src/sph_types.h:1713:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[7] = val; data/libntru-0.5/src/sph_types.h:1741:44: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return ((sph_u64)(((const unsigned char *)src)[0]) << 56) data/libntru-0.5/src/sph_types.h:1742:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[1]) << 48) data/libntru-0.5/src/sph_types.h:1743:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[2]) << 40) data/libntru-0.5/src/sph_types.h:1744:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[3]) << 32) data/libntru-0.5/src/sph_types.h:1745:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[4]) << 24) data/libntru-0.5/src/sph_types.h:1746:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[5]) << 16) data/libntru-0.5/src/sph_types.h:1747:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[6]) << 8) data/libntru-0.5/src/sph_types.h:1748:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | (sph_u64)(((const unsigned char *)src)[7]); data/libntru-0.5/src/sph_types.h:1752:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return ((sph_u64)(((const unsigned char *)src)[0]) << 56) data/libntru-0.5/src/sph_types.h:1753:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[1]) << 48) data/libntru-0.5/src/sph_types.h:1754:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[2]) << 40) data/libntru-0.5/src/sph_types.h:1755:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[3]) << 32) data/libntru-0.5/src/sph_types.h:1756:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[4]) << 24) data/libntru-0.5/src/sph_types.h:1757:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[5]) << 16) data/libntru-0.5/src/sph_types.h:1758:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[6]) << 8) data/libntru-0.5/src/sph_types.h:1759:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | (sph_u64)(((const unsigned char *)src)[7]); data/libntru-0.5/src/sph_types.h:1778:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return ((sph_u64)(((const unsigned char *)src)[0]) << 56) data/libntru-0.5/src/sph_types.h:1779:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[1]) << 48) data/libntru-0.5/src/sph_types.h:1780:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[2]) << 40) data/libntru-0.5/src/sph_types.h:1781:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[3]) << 32) data/libntru-0.5/src/sph_types.h:1782:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[4]) << 24) data/libntru-0.5/src/sph_types.h:1783:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[5]) << 16) data/libntru-0.5/src/sph_types.h:1784:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[6]) << 8) data/libntru-0.5/src/sph_types.h:1785:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | (sph_u64)(((const unsigned char *)src)[7]); data/libntru-0.5/src/sph_types.h:1811:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = val; data/libntru-0.5/src/sph_types.h:1812:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 8); data/libntru-0.5/src/sph_types.h:1813:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 16); data/libntru-0.5/src/sph_types.h:1814:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = (val >> 24); data/libntru-0.5/src/sph_types.h:1815:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[4] = (val >> 32); data/libntru-0.5/src/sph_types.h:1816:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[5] = (val >> 40); data/libntru-0.5/src/sph_types.h:1817:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[6] = (val >> 48); data/libntru-0.5/src/sph_types.h:1818:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[7] = (val >> 56); data/libntru-0.5/src/sph_types.h:1822:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = val; data/libntru-0.5/src/sph_types.h:1823:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 8); data/libntru-0.5/src/sph_types.h:1824:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 16); data/libntru-0.5/src/sph_types.h:1825:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = (val >> 24); data/libntru-0.5/src/sph_types.h:1826:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[4] = (val >> 32); data/libntru-0.5/src/sph_types.h:1827:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[5] = (val >> 40); data/libntru-0.5/src/sph_types.h:1828:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[6] = (val >> 48); data/libntru-0.5/src/sph_types.h:1829:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[7] = (val >> 56); data/libntru-0.5/src/sph_types.h:1848:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[0] = val; data/libntru-0.5/src/sph_types.h:1849:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[1] = (val >> 8); data/libntru-0.5/src/sph_types.h:1850:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[2] = (val >> 16); data/libntru-0.5/src/sph_types.h:1851:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[3] = (val >> 24); data/libntru-0.5/src/sph_types.h:1852:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[4] = (val >> 32); data/libntru-0.5/src/sph_types.h:1853:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[5] = (val >> 40); data/libntru-0.5/src/sph_types.h:1854:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[6] = (val >> 48); data/libntru-0.5/src/sph_types.h:1855:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *)dst)[7] = (val >> 56); data/libntru-0.5/src/sph_types.h:1905:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (sph_u64)(((const unsigned char *)src)[0]) data/libntru-0.5/src/sph_types.h:1906:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[1]) << 8) data/libntru-0.5/src/sph_types.h:1907:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[2]) << 16) data/libntru-0.5/src/sph_types.h:1908:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[3]) << 24) data/libntru-0.5/src/sph_types.h:1909:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[4]) << 32) data/libntru-0.5/src/sph_types.h:1910:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[5]) << 40) data/libntru-0.5/src/sph_types.h:1911:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[6]) << 48) data/libntru-0.5/src/sph_types.h:1912:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[7]) << 56); data/libntru-0.5/src/sph_types.h:1916:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (sph_u64)(((const unsigned char *)src)[0]) data/libntru-0.5/src/sph_types.h:1917:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[1]) << 8) data/libntru-0.5/src/sph_types.h:1918:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[2]) << 16) data/libntru-0.5/src/sph_types.h:1919:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[3]) << 24) data/libntru-0.5/src/sph_types.h:1920:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[4]) << 32) data/libntru-0.5/src/sph_types.h:1921:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[5]) << 40) data/libntru-0.5/src/sph_types.h:1922:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[6]) << 48) data/libntru-0.5/src/sph_types.h:1923:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[7]) << 56); data/libntru-0.5/src/sph_types.h:1961:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (sph_u64)(((const unsigned char *)src)[0]) data/libntru-0.5/src/sph_types.h:1962:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[1]) << 8) data/libntru-0.5/src/sph_types.h:1963:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[2]) << 16) data/libntru-0.5/src/sph_types.h:1964:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[3]) << 24) data/libntru-0.5/src/sph_types.h:1965:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[4]) << 32) data/libntru-0.5/src/sph_types.h:1966:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[5]) << 40) data/libntru-0.5/src/sph_types.h:1967:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[6]) << 48) data/libntru-0.5/src/sph_types.h:1968:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. | ((sph_u64)(((const unsigned char *)src)[7]) << 56); data/libntru-0.5/tests/test_ntru.c:82:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seed2_char[19]; data/libntru-0.5/tests/test_ntru.c:83:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(seed2_char, "my test password"); data/libntru-0.5/tests/test_ntru.c:183:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char plain_seed_char[25]; data/libntru-0.5/tests/test_ntru.c:184:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(plain_seed_char, "seed value for plaintext"); data/libntru-0.5/tests/test_ntru.c:191:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(plain2, plain, max_len); data/libntru-0.5/tests/test_ntru.c:196:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seed_char[11]; data/libntru-0.5/tests/test_ntru.c:197:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(seed_char, "seed value"); data/libntru-0.5/tests/test_ntru.c:200:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seed2_char[11]; data/libntru-0.5/tests/test_ntru.c:201:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(seed2_char, "seed value"); data/libntru-0.5/debian/tests/example1.c:29:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ntru_rand_init_det(&rand_ctx_ctr_drbg, &rng_ctr_drbg, seed, strlen(seed)) != NTRU_SUCCESS) data/libntru-0.5/debian/tests/example1.c:38:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ntru_encrypt(msg, strlen(msg), &kp.pub, ¶ms, &rand_ctx_def, enc) != NTRU_SUCCESS) data/libntru-0.5/src/hybrid.c:86:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uint8_t plain[strlen(plain_char)]; data/libntru-0.5/src/hybrid.c:88:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=0; i<strlen(plain_char); i++) data/libntru-0.5/src/hybrid.c:101:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uint8_t enc[ntru_enc_len(&NTRU_DEFAULT_PARAMS_128_BITS)+strlen(plain_char)+16]; data/libntru-0.5/src/hybrid.c:103:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ntru_encrypt_hybrid(plain, strlen(plain_char), &kp.pub, &NTRU_DEFAULT_PARAMS_128_BITS, &rand_ctx, enc, &enc_len) != NTRU_SUCCESS) data/libntru-0.5/src/rand.c:92:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t bytes_read = read(rand_fd, rand_data, len); data/libntru-0.5/src/rand.c:131:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uint16_t pers_string_size = strlen(NTRU_PERS_STRING) * sizeof(NTRU_PERS_STRING[0]); data/libntru-0.5/src/rand.c:170:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t bytes_read = read(rand_fd, buffer, len); data/libntru-0.5/src/rand.c:187:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uint16_t pers_string_size = strlen(NTRU_PERS_STRING) * sizeof(NTRU_PERS_STRING[0]); data/libntru-0.5/tests/test_hash.c:9:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(test_string_char); data/libntru-0.5/tests/test_ntru.c:38:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uint16_t seed_len = strlen(seed); data/libntru-0.5/tests/test_ntru.c:84:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uint8_t seed2[strlen(seed2_char)]; data/libntru-0.5/tests/test_ntru.c:89:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ntru_rand_init_det(&rand_ctx2, &rng, seed2, strlen(seed2_char)); data/libntru-0.5/tests/test_ntru.c:187:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). valid &= ntru_rand_init_det(&rand_ctx_plaintext, &rng_plaintext, plain_seed, strlen(plain_seed_char)) == NTRU_SUCCESS; data/libntru-0.5/tests/test_ntru.c:207:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). valid &= ntru_rand_init_det(&rand_ctx, &rng, seed, strlen(seed_char)) == NTRU_SUCCESS; data/libntru-0.5/tests/test_ntru.c:210:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). valid &= ntru_rand_init_det(&rand_ctx2, &rng2, seed2, strlen(seed2_char)) == NTRU_SUCCESS; data/libntru-0.5/tests/test_util.c:104:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= strcmp(params1->name, params2->name) == 0; data/libntru-0.5/tests/test_util.c:105:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->N == params2->N; data/libntru-0.5/tests/test_util.c:106:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->q == params2->q; data/libntru-0.5/tests/test_util.c:107:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->prod_flag == params2->prod_flag; data/libntru-0.5/tests/test_util.c:108:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->df1 == params2->df1; data/libntru-0.5/tests/test_util.c:110:9: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->df2 == params2->df2; data/libntru-0.5/tests/test_util.c:111:9: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->df3 == params2->df3; data/libntru-0.5/tests/test_util.c:113:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->dm0 == params2->dm0; data/libntru-0.5/tests/test_util.c:114:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->db == params2->db; data/libntru-0.5/tests/test_util.c:115:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->c == params2->c; data/libntru-0.5/tests/test_util.c:116:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->min_calls_r == params2->min_calls_r; data/libntru-0.5/tests/test_util.c:117:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->min_calls_mask == params2->min_calls_mask; data/libntru-0.5/tests/test_util.c:118:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->hash_seed == params2->hash_seed; data/libntru-0.5/tests/test_util.c:119:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= memcmp(params1->oid, params2->oid, sizeof(params1->oid)) == 0; data/libntru-0.5/tests/test_util.c:120:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= equals_hash_func(params1->hash, params2->hash, params1->hlen); data/libntru-0.5/tests/test_util.c:121:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->hlen == params2->hlen; data/libntru-0.5/tests/test_util.c:122:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal &= params1->pklen == params2->pklen; data/libntru-0.5/tests/test_util.c:123:12: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. return equal; data/libntru-0.5/tests/test_util.c:180:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(in); ANALYSIS SUMMARY: Hits = 285 Lines analyzed = 13798 in approximately 0.48 seconds (29021 lines/second) Physical Source Lines of Code (SLOC) = 9379 Hits@level = [0] 27 [1] 36 [2] 245 [3] 2 [4] 2 [5] 0 Hits@level+ = [0+] 312 [1+] 285 [2+] 249 [3+] 4 [4+] 2 [5+] 0 Hits/KSLOC@level+ = [0+] 33.2658 [1+] 30.387 [2+] 26.5487 [3+] 0.426485 [4+] 0.213242 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.