Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/linbox-1.6.3/benchmarks/BenchmarkFile.h Examining data/linbox-1.6.3/benchmarks/CSValue.h Examining data/linbox-1.6.3/benchmarks/benchmark-dense-solve.C Examining data/linbox-1.6.3/benchmarks/benchmark-example.C Examining data/linbox-1.6.3/benchmarks/benchmark-metadata.C Examining data/linbox-1.6.3/benchmarks/benchmark-metadata.h Examining data/linbox-1.6.3/benchmarks/benchmark-order-basis.C Examining data/linbox-1.6.3/benchmarks/benchmark-solve-cra.C Examining data/linbox-1.6.3/benchmarks/benchmark-utils.C Examining data/linbox-1.6.3/benchmarks/benchmark-utils.h Examining data/linbox-1.6.3/benchmarks/benchmark.C Examining data/linbox-1.6.3/benchmarks/benchmark.h Examining data/linbox-1.6.3/benchmarks/block-coppersmith-benchmark.C Examining data/linbox-1.6.3/benchmarks/gen-blocks.C Examining data/linbox-1.6.3/benchmarks/invariant-factors-benchmark.C Examining data/linbox-1.6.3/benchmarks/omp-benchmark.C Examining data/linbox-1.6.3/benchmarks/optimizer.h Examining data/linbox-1.6.3/examples/athadet.C Examining data/linbox-1.6.3/examples/bench-fft.C Examining data/linbox-1.6.3/examples/bench-matpoly-mult.C Examining data/linbox-1.6.3/examples/bench-new-fft.C Examining data/linbox-1.6.3/examples/bigmat.C Examining data/linbox-1.6.3/examples/blackbox/ex-mat0.C Examining data/linbox-1.6.3/examples/blackbox/example.C Examining data/linbox-1.6.3/examples/blackbox/load-det.C Examining data/linbox-1.6.3/examples/blackbox/load-minpoly.C Examining data/linbox-1.6.3/examples/blackbox/load-symmetrize.C Examining data/linbox-1.6.3/examples/blackbox/random-rank.C Examining data/linbox-1.6.3/examples/blackbox/smith.C Examining data/linbox-1.6.3/examples/blassolve.C Examining data/linbox-1.6.3/examples/charpoly.C Examining data/linbox-1.6.3/examples/checksolve.C Examining data/linbox-1.6.3/examples/det.C Examining data/linbox-1.6.3/examples/dot-product.C Examining data/linbox-1.6.3/examples/doubledet.C Examining data/linbox-1.6.3/examples/echelon.C Examining data/linbox-1.6.3/examples/fields/ex-fields-archetype.C Examining data/linbox-1.6.3/examples/fields/ex-fields.C Examining data/linbox-1.6.3/examples/fields/modular-int.C Examining data/linbox-1.6.3/examples/find-invariant-factors.C Examining data/linbox-1.6.3/examples/genprime.C Examining data/linbox-1.6.3/examples/gf3-invariant-factors.C Examining data/linbox-1.6.3/examples/givaro-poly-local.C Examining data/linbox-1.6.3/examples/graph-charpoly.C Examining data/linbox-1.6.3/examples/grid_reduce.C Examining data/linbox-1.6.3/examples/iliopoulos2.C Examining data/linbox-1.6.3/examples/integer-mul.C Examining data/linbox-1.6.3/examples/invariant-factors.C Examining data/linbox-1.6.3/examples/map-sparse-test.C Examining data/linbox-1.6.3/examples/map-sparse.h Examining data/linbox-1.6.3/examples/mats.C Examining data/linbox-1.6.3/examples/minpoly.C Examining data/linbox-1.6.3/examples/mpidet.C Examining data/linbox-1.6.3/examples/nullspacebasis.C Examining data/linbox-1.6.3/examples/nullspacebasis_rank.C Examining data/linbox-1.6.3/examples/omp_block_rank.C Examining data/linbox-1.6.3/examples/poly-smith.C Examining data/linbox-1.6.3/examples/power_rank.C Examining data/linbox-1.6.3/examples/poweroftwo_ranks.C Examining data/linbox-1.6.3/examples/qchar.C Examining data/linbox-1.6.3/examples/rank.C Examining data/linbox-1.6.3/examples/rr.C Examining data/linbox-1.6.3/examples/samplebb.C Examining data/linbox-1.6.3/examples/smith-form-kb.C Examining data/linbox-1.6.3/examples/smith-form-local.C Examining data/linbox-1.6.3/examples/smith.C Examining data/linbox-1.6.3/examples/smithsparse.C Examining data/linbox-1.6.3/examples/smithvalence.C Examining data/linbox-1.6.3/examples/solve.C Examining data/linbox-1.6.3/examples/solver/t-rdisolve.C Examining data/linbox-1.6.3/examples/solverat.C Examining data/linbox-1.6.3/examples/sparseelimdet.C Examining data/linbox-1.6.3/examples/sparseelimrank.C Examining data/linbox-1.6.3/examples/sparsesolverat.C Examining data/linbox-1.6.3/examples/valence.C Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-abstract.h Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-collection.h Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-data.h Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-function.h Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-functor.h Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox-type.h Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox.C Examining data/linbox-1.6.3/interfaces/driver/lb-blackbox.h Examining data/linbox-1.6.3/interfaces/driver/lb-charpoly.C Examining data/linbox-1.6.3/interfaces/driver/lb-charpoly.h Examining data/linbox-1.6.3/interfaces/driver/lb-det.C Examining data/linbox-1.6.3/interfaces/driver/lb-det.h Examining data/linbox-1.6.3/interfaces/driver/lb-domain-abstract.h Examining data/linbox-1.6.3/interfaces/driver/lb-domain-collection.h Examining data/linbox-1.6.3/interfaces/driver/lb-domain-data.h Examining data/linbox-1.6.3/interfaces/driver/lb-domain-function.h Examining data/linbox-1.6.3/interfaces/driver/lb-domain-functor.h Examining data/linbox-1.6.3/interfaces/driver/lb-domain-type.h Examining data/linbox-1.6.3/interfaces/driver/lb-domain.C Examining data/linbox-1.6.3/interfaces/driver/lb-domain.h Examining data/linbox-1.6.3/interfaces/driver/lb-driver.h Examining data/linbox-1.6.3/interfaces/driver/lb-element-abstract.h Examining data/linbox-1.6.3/interfaces/driver/lb-element-collection.h Examining data/linbox-1.6.3/interfaces/driver/lb-element-data.h Examining data/linbox-1.6.3/interfaces/driver/lb-element.C Examining data/linbox-1.6.3/interfaces/driver/lb-element.h Examining data/linbox-1.6.3/interfaces/driver/lb-garbage.C Examining data/linbox-1.6.3/interfaces/driver/lb-garbage.h Examining data/linbox-1.6.3/interfaces/driver/lb-interface.h Examining data/linbox-1.6.3/interfaces/driver/lb-minpoly.C Examining data/linbox-1.6.3/interfaces/driver/lb-minpoly.h Examining data/linbox-1.6.3/interfaces/driver/lb-polynomial.C Examining data/linbox-1.6.3/interfaces/driver/lb-polynomial.h Examining data/linbox-1.6.3/interfaces/driver/lb-rank.C Examining data/linbox-1.6.3/interfaces/driver/lb-rank.h Examining data/linbox-1.6.3/interfaces/driver/lb-solve.C Examining data/linbox-1.6.3/interfaces/driver/lb-solve.h Examining data/linbox-1.6.3/interfaces/driver/lb-utilities.h Examining data/linbox-1.6.3/interfaces/driver/lb-vector-abstract.h Examining data/linbox-1.6.3/interfaces/driver/lb-vector-collection.h Examining data/linbox-1.6.3/interfaces/driver/lb-vector-data.h Examining data/linbox-1.6.3/interfaces/driver/lb-vector-function.h Examining data/linbox-1.6.3/interfaces/driver/lb-vector-functor.h Examining data/linbox-1.6.3/interfaces/driver/lb-vector-type.h Examining data/linbox-1.6.3/interfaces/driver/lb-vector.C Examining data/linbox-1.6.3/interfaces/driver/lb-vector.h Examining data/linbox-1.6.3/interfaces/kaapi/communicate.h Examining data/linbox-1.6.3/interfaces/maple-old/lbmaple-ffpack.C Examining data/linbox-1.6.3/interfaces/maple-old/lbmaple.C Examining data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h Examining data/linbox-1.6.3/interfaces/maple/lb-maple.C Examining data/linbox-1.6.3/interfaces/maple/lb-maple.h Examining data/linbox-1.6.3/linbox/algorithms/alt-blackbox-block-container.h Examining data/linbox-1.6.3/linbox/algorithms/bbcharpoly.h Examining data/linbox-1.6.3/linbox/algorithms/bitonic-sort.h Examining data/linbox-1.6.3/linbox/algorithms/blackbox-block-container-base.h Examining data/linbox-1.6.3/linbox/algorithms/blackbox-block-container.h Examining data/linbox-1.6.3/linbox/algorithms/blackbox-container-base.h Examining data/linbox-1.6.3/linbox/algorithms/blackbox-container-symmetric.h Examining data/linbox-1.6.3/linbox/algorithms/blackbox-container-symmetrize.h Examining data/linbox-1.6.3/linbox/algorithms/blackbox-container.h Examining data/linbox-1.6.3/linbox/algorithms/block-coppersmith-domain.h Examining data/linbox-1.6.3/linbox/algorithms/block-lanczos.h Examining data/linbox-1.6.3/linbox/algorithms/block-massey-domain.h Examining data/linbox-1.6.3/linbox/algorithms/block-wiedemann.h Examining data/linbox-1.6.3/linbox/algorithms/charpoly-rational.h Examining data/linbox-1.6.3/linbox/algorithms/cia.h Examining data/linbox-1.6.3/linbox/algorithms/classic-rational-reconstruction.h Examining data/linbox-1.6.3/linbox/algorithms/coppersmith-invariant-factors.h Examining data/linbox-1.6.3/linbox/algorithms/coppersmith.h Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-early-multip.h Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-full-multip-fixed.h Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-full-multip.h Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-single.h Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-var-prec-early-multip.h Examining data/linbox-1.6.3/linbox/algorithms/cra-builder-var-prec-early-single.h Examining data/linbox-1.6.3/linbox/algorithms/cra-distributed.h Examining data/linbox-1.6.3/linbox/algorithms/cra-domain-omp.h Examining data/linbox-1.6.3/linbox/algorithms/cra-domain-sequential.h Examining data/linbox-1.6.3/linbox/algorithms/cra-domain.h Examining data/linbox-1.6.3/linbox/algorithms/cra-givrnsfixed.h Examining data/linbox-1.6.3/linbox/algorithms/cra-kaapi.h Examining data/linbox-1.6.3/linbox/algorithms/default.h Examining data/linbox-1.6.3/linbox/algorithms/dense-container.h Examining data/linbox-1.6.3/linbox/algorithms/dense-nullspace.h Examining data/linbox-1.6.3/linbox/algorithms/det-rational.h Examining data/linbox-1.6.3/linbox/algorithms/diophantine-solver.C Examining data/linbox-1.6.3/linbox/algorithms/diophantine-solver.h Examining data/linbox-1.6.3/linbox/algorithms/double-det.h Examining data/linbox-1.6.3/linbox/algorithms/dyadic-to-rational.h Examining data/linbox-1.6.3/linbox/algorithms/eliminator.h Examining data/linbox-1.6.3/linbox/algorithms/fast-rational-reconstruction.h Examining data/linbox-1.6.3/linbox/algorithms/frobenius-large.h Examining data/linbox-1.6.3/linbox/algorithms/frobenius-small.h Examining data/linbox-1.6.3/linbox/algorithms/gauss-gf2.h Examining data/linbox-1.6.3/linbox/algorithms/gauss.h Examining data/linbox-1.6.3/linbox/algorithms/hybrid-det.h Examining data/linbox-1.6.3/linbox/algorithms/invariant-factors.h Examining data/linbox-1.6.3/linbox/algorithms/invert-tb.h Examining data/linbox-1.6.3/linbox/algorithms/la-block-lanczos.h Examining data/linbox-1.6.3/linbox/algorithms/lanczos.h Examining data/linbox-1.6.3/linbox/algorithms/last-invariant-factor.h Examining data/linbox-1.6.3/linbox/algorithms/lattice.h Examining data/linbox-1.6.3/linbox/algorithms/lazy-product.h Examining data/linbox-1.6.3/linbox/algorithms/lifting-container.h Examining data/linbox-1.6.3/linbox/algorithms/massey-domain.h Examining data/linbox-1.6.3/linbox/algorithms/matpoly-mult.h Examining data/linbox-1.6.3/linbox/algorithms/matrix-blas3/mul.h Examining data/linbox-1.6.3/linbox/algorithms/matrix-hom.h Examining data/linbox-1.6.3/linbox/algorithms/matrix-inverse.h Examining data/linbox-1.6.3/linbox/algorithms/matrix-rank.h Examining data/linbox-1.6.3/linbox/algorithms/mg-block-lanczos.h Examining data/linbox-1.6.3/linbox/algorithms/minpoly-integer.h Examining data/linbox-1.6.3/linbox/algorithms/minpoly-rational.h Examining data/linbox-1.6.3/linbox/algorithms/numeric-solver-lapack.h Examining data/linbox-1.6.3/linbox/algorithms/one-invariant-factor.h Examining data/linbox-1.6.3/linbox/algorithms/opencl-environ.h Examining data/linbox-1.6.3/linbox/algorithms/opencl-resource-controller.h Examining data/linbox-1.6.3/linbox/algorithms/poly-det.h Examining data/linbox-1.6.3/linbox/algorithms/poly-dixon.h Examining data/linbox-1.6.3/linbox/algorithms/poly-interpolation.h Examining data/linbox-1.6.3/linbox/algorithms/poly-smith-form-local-x.h Examining data/linbox-1.6.3/linbox/algorithms/poly-smith-form.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/matpoly-add-domain.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/matpoly-mult-fft.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/matpoly-mult-kara.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/matpoly-mult-naive.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/order-basis.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-algorithms.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-butterflies.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-init.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-transform.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-matrix-domain.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/simd-additional-functions.h Examining data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/simd.h Examining data/linbox-1.6.3/linbox/algorithms/rational-cra-builder-early-multip.h Examining data/linbox-1.6.3/linbox/algorithms/rational-cra-builder-early-single.h Examining data/linbox-1.6.3/linbox/algorithms/rational-cra-builder-full-multip.h Examining data/linbox-1.6.3/linbox/algorithms/rational-cra-var-prec.h Examining data/linbox-1.6.3/linbox/algorithms/rational-cra.h Examining data/linbox-1.6.3/linbox/algorithms/rational-reconstruction.h Examining data/linbox-1.6.3/linbox/algorithms/rational-reconstruction2.h Examining data/linbox-1.6.3/linbox/algorithms/rational-solver-adaptive.h Examining data/linbox-1.6.3/linbox/algorithms/rational-solver-sn.h Examining data/linbox-1.6.3/linbox/algorithms/rational-solver.h Examining data/linbox-1.6.3/linbox/algorithms/rational-solver2.h Examining data/linbox-1.6.3/linbox/algorithms/rns.h Examining data/linbox-1.6.3/linbox/algorithms/short-vector.h Examining data/linbox-1.6.3/linbox/algorithms/sigma-basis.h Examining data/linbox-1.6.3/linbox/algorithms/signature.h Examining data/linbox-1.6.3/linbox/algorithms/smith-form-adaptive.h Examining data/linbox-1.6.3/linbox/algorithms/smith-form-binary.h Examining data/linbox-1.6.3/linbox/algorithms/smith-form-iliopoulos.h Examining data/linbox-1.6.3/linbox/algorithms/smith-form-kannan-bachem.h Examining data/linbox-1.6.3/linbox/algorithms/smith-form-local.h Examining data/linbox-1.6.3/linbox/algorithms/smith-form-sparseelim-local.h Examining data/linbox-1.6.3/linbox/algorithms/smith-form-sparseelim-poweroftwo.h Examining data/linbox-1.6.3/linbox/algorithms/smith-form-valence.h Examining data/linbox-1.6.3/linbox/algorithms/toeplitz-det.h Examining data/linbox-1.6.3/linbox/algorithms/triangular-solve-gf2.h Examining data/linbox-1.6.3/linbox/algorithms/triangular-solve.h Examining data/linbox-1.6.3/linbox/algorithms/vector-fraction.h Examining data/linbox-1.6.3/linbox/algorithms/weak-popov-form.h Examining data/linbox-1.6.3/linbox/algorithms/whisart_trace.h Examining data/linbox-1.6.3/linbox/algorithms/wiedemann.h Examining data/linbox-1.6.3/linbox/algorithms/rational-reconstruction-base.h Examining data/linbox-1.6.3/linbox/blackbox/archetype.h Examining data/linbox-1.6.3/linbox/blackbox/bb.h Examining data/linbox-1.6.3/linbox/blackbox/blackbox-interface.h Examining data/linbox-1.6.3/linbox/blackbox/blackbox.h Examining data/linbox-1.6.3/linbox/blackbox/block-compose.h Examining data/linbox-1.6.3/linbox/blackbox/block-hankel-inverse.h Examining data/linbox-1.6.3/linbox/blackbox/block-hankel.h Examining data/linbox-1.6.3/linbox/blackbox/block-toeplitz.h Examining data/linbox-1.6.3/linbox/blackbox/blockbb.h Examining data/linbox-1.6.3/linbox/blackbox/butterfly.h Examining data/linbox-1.6.3/linbox/blackbox/companion.h Examining data/linbox-1.6.3/linbox/blackbox/compose.h Examining data/linbox-1.6.3/linbox/blackbox/csf.h Examining data/linbox-1.6.3/linbox/blackbox/diagonal-gf2.h Examining data/linbox-1.6.3/linbox/blackbox/diagonal.h Examining data/linbox-1.6.3/linbox/blackbox/dif.h Examining data/linbox-1.6.3/linbox/blackbox/direct-sum.h Examining data/linbox-1.6.3/linbox/blackbox/factory.h Examining data/linbox-1.6.3/linbox/blackbox/fflas-csr.h Examining data/linbox-1.6.3/linbox/blackbox/fibb-product.h Examining data/linbox-1.6.3/linbox/blackbox/fibb.h Examining data/linbox-1.6.3/linbox/blackbox/frobenius.h Examining data/linbox-1.6.3/linbox/blackbox/hilbert.h Examining data/linbox-1.6.3/linbox/blackbox/inverse.h Examining data/linbox-1.6.3/linbox/blackbox/jit-matrix.h Examining data/linbox-1.6.3/linbox/blackbox/lambda-sparse.h Examining data/linbox-1.6.3/linbox/blackbox/matrix-blackbox.h Examining data/linbox-1.6.3/linbox/blackbox/moore-penrose.h Examining data/linbox-1.6.3/linbox/blackbox/ntl-hankel.h Examining data/linbox-1.6.3/linbox/blackbox/ntl-sylvester.h Examining data/linbox-1.6.3/linbox/blackbox/null-matrix.h Examining data/linbox-1.6.3/linbox/blackbox/pascal.h Examining data/linbox-1.6.3/linbox/blackbox/permutation.h Examining data/linbox-1.6.3/linbox/blackbox/polynomial.h Examining data/linbox-1.6.3/linbox/blackbox/quad-matrix.h Examining data/linbox-1.6.3/linbox/blackbox/random-matrix-traits.h Examining data/linbox-1.6.3/linbox/blackbox/random-matrix.h Examining data/linbox-1.6.3/linbox/blackbox/rational-matrix-factory.h Examining data/linbox-1.6.3/linbox/blackbox/scalar-matrix.h Examining data/linbox-1.6.3/linbox/blackbox/scompose.h Examining data/linbox-1.6.3/linbox/blackbox/squarize.h Examining data/linbox-1.6.3/linbox/blackbox/submatrix-traits.h Examining data/linbox-1.6.3/linbox/blackbox/submatrix.h Examining data/linbox-1.6.3/linbox/blackbox/sum.h Examining data/linbox-1.6.3/linbox/blackbox/toeplitz.h Examining data/linbox-1.6.3/linbox/blackbox/transpose.h Examining data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h Examining data/linbox-1.6.3/linbox/blackbox/zero-one.h Examining data/linbox-1.6.3/linbox/blackbox/zo-gf2.h Examining data/linbox-1.6.3/linbox/blackbox/zo.h Examining data/linbox-1.6.3/linbox/blackbox/apply.h Examining data/linbox-1.6.3/linbox/config-blas.h Examining data/linbox-1.6.3/linbox/dummy.C Examining data/linbox-1.6.3/linbox/element/abstract.h Examining data/linbox-1.6.3/linbox/element/archetype.h Examining data/linbox-1.6.3/linbox/element/envelope.h Examining data/linbox-1.6.3/linbox/element/gmp-rational.h Examining data/linbox-1.6.3/linbox/field/abstract.h Examining data/linbox-1.6.3/linbox/field/archetype.h Examining data/linbox-1.6.3/linbox/field/envelope.h Examining data/linbox-1.6.3/linbox/field/field-documentation.h Examining data/linbox-1.6.3/linbox/field/field-traits.h Examining data/linbox-1.6.3/linbox/field/gf2.h Examining data/linbox-1.6.3/linbox/field/gmp-rational.h Examining data/linbox-1.6.3/linbox/field/hom.h Examining data/linbox-1.6.3/linbox/field/map.h Examining data/linbox-1.6.3/linbox/field/multimod-field.h Examining data/linbox-1.6.3/linbox/field/param-fuzzy.h Examining data/linbox-1.6.3/linbox/field/rebind.h Examining data/linbox-1.6.3/linbox/integer.h Examining data/linbox-1.6.3/linbox/iterators/blackbox-symmetric-iterator.h Examining data/linbox-1.6.3/linbox/iterators/blackbox-symmetrize-iterator.h Examining data/linbox-1.6.3/linbox/linbox-config.h Examining data/linbox-1.6.3/linbox/linbox-tags.h Examining data/linbox-1.6.3/linbox/matrix/abnormal-helpers.h Examining data/linbox-1.6.3/linbox/matrix/abnormal-matrix.h Examining data/linbox-1.6.3/linbox/matrix/archetype.h Examining data/linbox-1.6.3/linbox/matrix/dense-matrix.h Examining data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix-multimod.h Examining data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h Examining data/linbox-1.6.3/linbox/matrix/densematrix/blas-transposed-matrix.h Examining data/linbox-1.6.3/linbox/matrix/factorized-matrix.h Examining data/linbox-1.6.3/linbox/matrix/grid.h Examining data/linbox-1.6.3/linbox/matrix/matrix-category.h Examining data/linbox-1.6.3/linbox/matrix/matrix-domain.h Examining data/linbox-1.6.3/linbox/matrix/matrix-traits.h Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/apply-domain.h Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/blas-matrix-domain.h Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/matrix-domain-gf2.h Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/matrix-domain.h Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain-factory.h Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain.h Examining data/linbox-1.6.3/linbox/matrix/matrixdomain/plain-domain.h Examining data/linbox-1.6.3/linbox/matrix/permutation-matrix.h Examining data/linbox-1.6.3/linbox/matrix/plain-matrix.h Examining data/linbox-1.6.3/linbox/matrix/polynomial-matrix.h Examining data/linbox-1.6.3/linbox/matrix/random-matrix.h Examining data/linbox-1.6.3/linbox/matrix/sliced3.h Examining data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h Examining data/linbox-1.6.3/linbox/matrix/sliced3/dense-sliced.h Examining data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h Examining data/linbox-1.6.3/linbox/matrix/sliced3/sliced-stepper.h Examining data/linbox-1.6.3/linbox/matrix/sliced3/submat-iterator.h Examining data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/SlicedPolynomialMatrix.h Examining data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/SlicedPolynomialMatrixAddSub.h Examining data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/SlicedPolynomialMatrixMulKaratsuba.h Examining data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/SlicedPolynomialMatrixMulToomCook.h Examining data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/conversion.h Examining data/linbox-1.6.3/linbox/matrix/sparse-formats.h Examining data/linbox-1.6.3/linbox/matrix/sparse-matrix.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/read-write-sparse.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-associative-vector.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-matrix.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-csr-matrix.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-domain.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ell-matrix.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ellr-matrix.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-generic.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-hyb-matrix.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-map-map-matrix.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-parallel-vector.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-sequence-vector.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-tpl-matrix-omp.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-tpl-matrix.h Examining data/linbox-1.6.3/linbox/matrix/sparsematrix/triples-coord.h Examining data/linbox-1.6.3/linbox/matrix/transpose-matrix.h Examining data/linbox-1.6.3/linbox/polynomial/dense-polynomial.h Examining data/linbox-1.6.3/linbox/randiter/abstract.h Examining data/linbox-1.6.3/linbox/randiter/archetype.h Examining data/linbox-1.6.3/linbox/randiter/envelope.h Examining data/linbox-1.6.3/linbox/randiter/generic.h Examining data/linbox-1.6.3/linbox/randiter/gf2.h Examining data/linbox-1.6.3/linbox/randiter/gmp-random-prime.h Examining data/linbox-1.6.3/linbox/randiter/gmp-rational.h Examining data/linbox-1.6.3/linbox/randiter/lidia-gfq.h Examining data/linbox-1.6.3/linbox/randiter/lidia.h Examining data/linbox-1.6.3/linbox/randiter/mersenne-twister.C Examining data/linbox-1.6.3/linbox/randiter/mersenne-twister.h Examining data/linbox-1.6.3/linbox/randiter/modular-balanced.h Examining data/linbox-1.6.3/linbox/randiter/modular-crooked.h Examining data/linbox-1.6.3/linbox/randiter/multimod-randomprime.h Examining data/linbox-1.6.3/linbox/randiter/ntl-zz.h Examining data/linbox-1.6.3/linbox/randiter/param-fuzzy.h Examining data/linbox-1.6.3/linbox/randiter/random-fftprime.h Examining data/linbox-1.6.3/linbox/randiter/random-prime.h Examining data/linbox-1.6.3/linbox/ring/abstract.h Examining data/linbox-1.6.3/linbox/ring/archetype.h Examining data/linbox-1.6.3/linbox/ring/envelope.h Examining data/linbox-1.6.3/linbox/ring/local-pir-modular.h Examining data/linbox-1.6.3/linbox/ring/local2_32.h Examining data/linbox-1.6.3/linbox/ring/modular.h Examining data/linbox-1.6.3/linbox/ring/modular/modular-balanced-double.h Examining data/linbox-1.6.3/linbox/ring/modular/modular-balanced-float.h Examining data/linbox-1.6.3/linbox/ring/modular/modular-balanced-int32.h Examining data/linbox-1.6.3/linbox/ring/modular/modular-balanced-int64.h Examining data/linbox-1.6.3/linbox/ring/modular/modular-byte.h Examining data/linbox-1.6.3/linbox/ring/modular/modular-double.h Examining data/linbox-1.6.3/linbox/ring/modular/modular-float.h Examining data/linbox-1.6.3/linbox/ring/modular/modular-int32.h Examining data/linbox-1.6.3/linbox/ring/modular/modular-int64.h Examining data/linbox-1.6.3/linbox/ring/modular/modular-short.h Examining data/linbox-1.6.3/linbox/ring/modular/modular-unsigned.h Examining data/linbox-1.6.3/linbox/ring/ntl.h Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-gf2e.h Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_p.h Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pex.h Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-rr.h Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-zz.h Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_p.h Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h Examining data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_px.h Examining data/linbox-1.6.3/linbox/ring/pid-ntl-zz_p.h Examining data/linbox-1.6.3/linbox/ring/pir-modular-int32.h Examining data/linbox-1.6.3/linbox/ring/pir-ntl-zz_p.h Examining data/linbox-1.6.3/linbox/ring/polynomial-local-x.h Examining data/linbox-1.6.3/linbox/ring/polynomial-ring.h Examining data/linbox-1.6.3/linbox/ring/ring-interface.h Examining data/linbox-1.6.3/linbox/solutions/charpoly.h Examining data/linbox-1.6.3/linbox/solutions/constants.h Examining data/linbox-1.6.3/linbox/solutions/det.h Examining data/linbox-1.6.3/linbox/solutions/echelon.h Examining data/linbox-1.6.3/linbox/solutions/echelon/echelon-auto.h Examining data/linbox-1.6.3/linbox/solutions/echelon/echelon-dense-elimination.h Examining data/linbox-1.6.3/linbox/solutions/getentry.h Examining data/linbox-1.6.3/linbox/solutions/hadamard-bound.h Examining data/linbox-1.6.3/linbox/solutions/is-positive-definite.h Examining data/linbox-1.6.3/linbox/solutions/is-positive-semidefinite.h Examining data/linbox-1.6.3/linbox/solutions/methods.h Examining data/linbox-1.6.3/linbox/solutions/minpoly.h Examining data/linbox-1.6.3/linbox/solutions/nullspace.h Examining data/linbox-1.6.3/linbox/solutions/rank.h Examining data/linbox-1.6.3/linbox/solutions/smith-form.h Examining data/linbox-1.6.3/linbox/solutions/solution-tags.h Examining data/linbox-1.6.3/linbox/solutions/solve.h Examining data/linbox-1.6.3/linbox/solutions/solve/solve-auto.h Examining data/linbox-1.6.3/linbox/solutions/solve/solve-blackbox.h Examining data/linbox-1.6.3/linbox/solutions/solve/solve-cra.h Examining data/linbox-1.6.3/linbox/solutions/solve/solve-dense-elimination.h Examining data/linbox-1.6.3/linbox/solutions/solve/solve-dixon.h Examining data/linbox-1.6.3/linbox/solutions/solve/solve-elimination.h Examining data/linbox-1.6.3/linbox/solutions/solve/solve-lanczos.h Examining data/linbox-1.6.3/linbox/solutions/solve/solve-numeric-symbolic.h Examining data/linbox-1.6.3/linbox/solutions/solve/solve-sparse-elimination.h Examining data/linbox-1.6.3/linbox/solutions/solve/solve-wiedemann.h Examining data/linbox-1.6.3/linbox/solutions/trace.h Examining data/linbox-1.6.3/linbox/solutions/valence.h Examining data/linbox-1.6.3/linbox/util/args-parser.h Examining data/linbox-1.6.3/linbox/util/commentator.h Examining data/linbox-1.6.3/linbox/util/contracts.h Examining data/linbox-1.6.3/linbox/util/debug.C Examining data/linbox-1.6.3/linbox/util/debug.h Examining data/linbox-1.6.3/linbox/util/error.C Examining data/linbox-1.6.3/linbox/util/error.h Examining data/linbox-1.6.3/linbox/util/field-axpy.h Examining data/linbox-1.6.3/linbox/util/formats/generic-dense.h Examining data/linbox-1.6.3/linbox/util/formats/maple.h Examining data/linbox-1.6.3/linbox/util/formats/matrix-market.h Examining data/linbox-1.6.3/linbox/util/formats/matrix-stream-readers.h Examining data/linbox-1.6.3/linbox/util/formats/sms.h Examining data/linbox-1.6.3/linbox/util/formats/sparse-row.h Examining data/linbox-1.6.3/linbox/util/iml_wrapper.h Examining data/linbox-1.6.3/linbox/util/matrix-stream.h Examining data/linbox-1.6.3/linbox/util/mpicpp.h Examining data/linbox-1.6.3/linbox/util/prime-stream.h Examining data/linbox-1.6.3/linbox/util/serialization.h Examining data/linbox-1.6.3/linbox/util/timer.h Examining data/linbox-1.6.3/linbox/util/write-mm.h Examining data/linbox-1.6.3/linbox/vector/bit-vector.h Examining data/linbox-1.6.3/linbox/vector/blas-vector.h Examining data/linbox-1.6.3/linbox/vector/light_container.h Examining data/linbox-1.6.3/linbox/vector/pair.h Examining data/linbox-1.6.3/linbox/vector/random.h Examining data/linbox-1.6.3/linbox/vector/reverse.h Examining data/linbox-1.6.3/linbox/vector/slicedpolynomialvector/SlicedPolynomialMatrixVectorMulKaratsuba.h Examining data/linbox-1.6.3/linbox/vector/slicedpolynomialvector/SlicedPolynomialVector.h Examining data/linbox-1.6.3/linbox/vector/slicedpolynomialvector/SlicedPolynomialVectorAddSub.h Examining data/linbox-1.6.3/linbox/vector/sparse.h Examining data/linbox-1.6.3/linbox/vector/stream-gf2.h Examining data/linbox-1.6.3/linbox/vector/stream.h Examining data/linbox-1.6.3/linbox/vector/subiterator.h Examining data/linbox-1.6.3/linbox/vector/subvector.h Examining data/linbox-1.6.3/linbox/vector/vector-domain-gf2.h Examining data/linbox-1.6.3/linbox/vector/vector-domain.h Examining data/linbox-1.6.3/linbox/vector/vector-traits.h Examining data/linbox-1.6.3/linbox/vector/vector.h Examining data/linbox-1.6.3/macros/CodeChunk/instrset.h Examining data/linbox-1.6.3/macros/CodeChunk/instrset_detect.cpp Examining data/linbox-1.6.3/template.h Examining data/linbox-1.6.3/tests/benchmark-blas-domain.C Examining data/linbox-1.6.3/tests/benchmark-fields.C Examining data/linbox-1.6.3/tests/checker.C Examining data/linbox-1.6.3/tests/matrix/coin.h Examining data/linbox-1.6.3/tests/matrix/hadamard.h Examining data/linbox-1.6.3/tests/matrix/invhilb.h Examining data/linbox-1.6.3/tests/matrix/jmat.h Examining data/linbox-1.6.3/tests/matrix/minmax.h Examining data/linbox-1.6.3/tests/matrix/randomans.h Examining data/linbox-1.6.3/tests/matrix/randommat.h Examining data/linbox-1.6.3/tests/test-bitonic-sort.C Examining data/linbox-1.6.3/tests/test-blackbox-block-container.C Examining data/linbox-1.6.3/tests/test-blackbox.h Examining data/linbox-1.6.3/tests/test-blas-domain.C Examining data/linbox-1.6.3/tests/test-blas-matrix.C Examining data/linbox-1.6.3/tests/test-block-ring.C Examining data/linbox-1.6.3/tests/test-block-wiedemann.C Examining data/linbox-1.6.3/tests/test-butterfly.C Examining data/linbox-1.6.3/tests/test-charpoly.C Examining data/linbox-1.6.3/tests/test-commentator.C Examining data/linbox-1.6.3/tests/test-common.h Examining data/linbox-1.6.3/tests/test-companion.C Examining data/linbox-1.6.3/tests/test-cra.C Examining data/linbox-1.6.3/tests/test-cradomain.C Examining data/linbox-1.6.3/tests/test-dense-zero-one.C Examining data/linbox-1.6.3/tests/test-dense.C Examining data/linbox-1.6.3/tests/test-det.C Examining data/linbox-1.6.3/tests/test-diagonal.C Examining data/linbox-1.6.3/tests/test-dif.C Examining data/linbox-1.6.3/tests/test-direct-sum.C Examining data/linbox-1.6.3/tests/test-dyadic-to-rational.C Examining data/linbox-1.6.3/tests/test-echelon-form.C Examining data/linbox-1.6.3/tests/test-ffpack.C Examining data/linbox-1.6.3/tests/test-fibb.C Examining data/linbox-1.6.3/tests/test-field.h Examining data/linbox-1.6.3/tests/test-frobenius-large.C Examining data/linbox-1.6.3/tests/test-frobenius-small.C Examining data/linbox-1.6.3/tests/test-frobenius.C Examining data/linbox-1.6.3/tests/test-ftrmm.C Examining data/linbox-1.6.3/tests/test-generic.h Examining data/linbox-1.6.3/tests/test-getentry.C Examining data/linbox-1.6.3/tests/test-gf2.C Examining data/linbox-1.6.3/tests/test-givaro-interfaces.C Examining data/linbox-1.6.3/tests/test-givaro-zpz.C Examining data/linbox-1.6.3/tests/test-givaro-zpzuns.C Examining data/linbox-1.6.3/tests/test-givaropoly.C Examining data/linbox-1.6.3/tests/test-gmp-rational.C Examining data/linbox-1.6.3/tests/test-hadamard-bound.C Examining data/linbox-1.6.3/tests/test-hilbert.C Examining data/linbox-1.6.3/tests/test-hom.C Examining data/linbox-1.6.3/tests/test-image-field.C Examining data/linbox-1.6.3/tests/test-invariant-factors.C Examining data/linbox-1.6.3/tests/test-inverse.C Examining data/linbox-1.6.3/tests/test-isposdef.C Examining data/linbox-1.6.3/tests/test-ispossemidef.C Examining data/linbox-1.6.3/tests/test-la-block-lanczos.C Examining data/linbox-1.6.3/tests/test-last-invariant-factor.C Examining data/linbox-1.6.3/tests/test-local-smith-form-sparseelim.C Examining data/linbox-1.6.3/tests/test-matpoly-mult.C Examining data/linbox-1.6.3/tests/test-matrix-domain.C Examining data/linbox-1.6.3/tests/test-matrix-domain.h Examining data/linbox-1.6.3/tests/test-matrix-stream.C Examining data/linbox-1.6.3/tests/test-matrix-utils.h Examining data/linbox-1.6.3/tests/test-mg-block-lanczos.C Examining data/linbox-1.6.3/tests/test-minpoly.C Examining data/linbox-1.6.3/tests/test-modular-balanced-double.C Examining data/linbox-1.6.3/tests/test-modular-balanced-float.C Examining data/linbox-1.6.3/tests/test-modular-balanced-int.C Examining data/linbox-1.6.3/tests/test-modular-byte.C Examining data/linbox-1.6.3/tests/test-modular-double.C Examining data/linbox-1.6.3/tests/test-modular-float.C Examining data/linbox-1.6.3/tests/test-modular-int.C Examining data/linbox-1.6.3/tests/test-modular-short.C Examining data/linbox-1.6.3/tests/test-modular.C Examining data/linbox-1.6.3/tests/test-moore-penrose.C Examining data/linbox-1.6.3/tests/test-mpi-comm.C Examining data/linbox-1.6.3/tests/test-ntl-hankel.C Examining data/linbox-1.6.3/tests/test-ntl-lzz_p.C Examining data/linbox-1.6.3/tests/test-ntl-lzz_pe.C Examining data/linbox-1.6.3/tests/test-ntl-lzz_pex.C Examining data/linbox-1.6.3/tests/test-ntl-lzz_px.C Examining data/linbox-1.6.3/tests/test-ntl-rr.C Examining data/linbox-1.6.3/tests/test-ntl-sylvester.C Examining data/linbox-1.6.3/tests/test-ntl-toeplitz.C Examining data/linbox-1.6.3/tests/test-ntl-zz_p.C Examining data/linbox-1.6.3/tests/test-nullspace.C Examining data/linbox-1.6.3/tests/test-one-invariant-factor.C Examining data/linbox-1.6.3/tests/test-opencl-domain.C Examining data/linbox-1.6.3/tests/test-optimization.C Examining data/linbox-1.6.3/tests/test-order-basis.C Examining data/linbox-1.6.3/tests/test-param-fuzzy.C Examining data/linbox-1.6.3/tests/test-permutation.C Examining data/linbox-1.6.3/tests/test-plain-domain.C Examining data/linbox-1.6.3/tests/test-poly-det.C Examining data/linbox-1.6.3/tests/test-poly-smith-form.h Examining data/linbox-1.6.3/tests/test-polynomial-ring.C Examining data/linbox-1.6.3/tests/test-qlup.C Examining data/linbox-1.6.3/tests/test-quad-matrix.C Examining data/linbox-1.6.3/tests/test-randiter-nonzero-prime.C Examining data/linbox-1.6.3/tests/test-random-matrix.C Examining data/linbox-1.6.3/tests/test-rank-Int.C Examining data/linbox-1.6.3/tests/test-rank-md.C Examining data/linbox-1.6.3/tests/test-rank-u32.C Examining data/linbox-1.6.3/tests/test-rank.h Examining data/linbox-1.6.3/tests/test-rat-charpoly.C Examining data/linbox-1.6.3/tests/test-rat-minpoly.C Examining data/linbox-1.6.3/tests/test-rat-solve.C Examining data/linbox-1.6.3/tests/test-rational-matrix-factory.C Examining data/linbox-1.6.3/tests/test-rational-reconstruction-base.C Examining data/linbox-1.6.3/tests/test-rational-solver-adaptive.C Examining data/linbox-1.6.3/tests/test-rational-solver.C Examining data/linbox-1.6.3/tests/test-regression.C Examining data/linbox-1.6.3/tests/test-scalar-matrix.C Examining data/linbox-1.6.3/tests/test-serialization.C Examining data/linbox-1.6.3/tests/test-smith-form-adaptive.C Examining data/linbox-1.6.3/tests/test-smith-form-binary.C Examining data/linbox-1.6.3/tests/test-smith-form-iliopoulos.C Examining data/linbox-1.6.3/tests/test-smith-form-local.C Examining data/linbox-1.6.3/tests/test-smith-form-valence.C Examining data/linbox-1.6.3/tests/test-smith-form.C Examining data/linbox-1.6.3/tests/test-smith-form.h Examining data/linbox-1.6.3/tests/test-solve-full.C Examining data/linbox-1.6.3/tests/test-solve-nonsingular.C Examining data/linbox-1.6.3/tests/test-solve.C Examining data/linbox-1.6.3/tests/test-sparse-map-map.C Examining data/linbox-1.6.3/tests/test-sparse.C Examining data/linbox-1.6.3/tests/test-subiterator.C Examining data/linbox-1.6.3/tests/test-submatrix.C Examining data/linbox-1.6.3/tests/test-subvector.C Examining data/linbox-1.6.3/tests/test-sum.C Examining data/linbox-1.6.3/tests/test-toeplitz-det.C Examining data/linbox-1.6.3/tests/test-toeplitz.C Examining data/linbox-1.6.3/tests/test-toom-cook.C Examining data/linbox-1.6.3/tests/test-trace.C Examining data/linbox-1.6.3/tests/test-transpose.C Examining data/linbox-1.6.3/tests/test-triplesbb-omp.C Examining data/linbox-1.6.3/tests/test-triplesbb.C Examining data/linbox-1.6.3/tests/test-tutorial.C Examining data/linbox-1.6.3/tests/test-vector-domain.C Examining data/linbox-1.6.3/tests/test-vector-domain.h Examining data/linbox-1.6.3/tests/test-weak-popov-form.C Examining data/linbox-1.6.3/tests/test-zero-one.C FINAL RESULTS: data/linbox-1.6.3/benchmarks/benchmark.C:1447:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. int err = system( command.c_str() ) ; data/linbox-1.6.3/benchmarks/benchmark.C:1503:14: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. int err = system( "test -d data || ( rm -rf data && mkdir data )" ) ; data/linbox-1.6.3/examples/qchar.C:403:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(numstr, strtok(xstr, "/")); data/linbox-1.6.3/examples/qchar.C:405:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tenstr, strtok(NULL, "/")); data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:123:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(msg, out.str().c_str()); data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:203:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(msg, out.str().c_str()); data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:280:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(msg, out.str().c_str()); data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:350:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(msg, out.str().c_str()); data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:420:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(msg, out.str().c_str()); data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:482:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). std::strcpy(ptr, tp.c_str()); data/linbox-1.6.3/tests/checker.C:161:2: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("ls test-*C >.tmp-tests"); data/linbox-1.6.3/tests/checker.C:183:5: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system(cmd.c_str()); data/linbox-1.6.3/tests/checker.C:188:17: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. int status = system(cmd.c_str()); data/linbox-1.6.3/tests/checker.C:199:14: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. status = system(prog.str().c_str()); data/linbox-1.6.3/tests/test-field.h:395:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:446:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:499:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:574:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:647:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:718:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:799:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:856:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:942:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:1021:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:1098:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:1167:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:1224:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:1256:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:1303:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/tests/test-field.h:1474:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st, str.str().c_str()); data/linbox-1.6.3/benchmarks/benchmark-example.C:95:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RandMat.random(A); data/linbox-1.6.3/benchmarks/benchmark-example.C:96:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RandMat.random(B); data/linbox-1.6.3/benchmarks/benchmark-example.C:97:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RandMat.random(C); data/linbox-1.6.3/benchmarks/benchmark-order-basis.C:287:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gen.random(Serie->ref(i,j,k)); data/linbox-1.6.3/benchmarks/benchmark-solve-cra.C:74:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.random(randIter); data/linbox-1.6.3/benchmarks/benchmark-solve-cra.C:124:9: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(seed); data/linbox-1.6.3/benchmarks/benchmark.C:1497:4: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time(NULL)); data/linbox-1.6.3/benchmarks/gen-blocks.C:113:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(seed); data/linbox-1.6.3/examples/bench-fft.C:50:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(v[i]); data/linbox-1.6.3/examples/bench-matpoly-mult.C:95:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(v[i]); data/linbox-1.6.3/examples/bench-matpoly-mult.C:102:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(m.refEntry(i,j)); data/linbox-1.6.3/examples/bench-matpoly-mult.C:357:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/linbox-1.6.3/examples/bench-new-fft.C:52:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(v[i]); data/linbox-1.6.3/examples/blackbox/example.C:135:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand (time (NULL)); data/linbox-1.6.3/examples/blassolve.C:85:17: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (drand48() <0.5) data/linbox-1.6.3/examples/grid_reduce.C:44:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/linbox-1.6.3/examples/iliopoulos2.C:75:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(L); data/linbox-1.6.3/examples/iliopoulos2.C:89:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(U); data/linbox-1.6.3/examples/map-sparse-test.C:23:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/examples/omp_block_rank.C:263:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. generator.random( *vit ); data/linbox-1.6.3/examples/omp_block_rank.C:297:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do generator.random (d1[i]); while (F.isZero (d1[i])); data/linbox-1.6.3/examples/omp_block_rank.C:301:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do generator.random (d2[i]); while (F.isZero (d2[i])); data/linbox-1.6.3/examples/omp_block_rank.C:436:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do generator.random (*itp); while (F.isZero (*itp)); data/linbox-1.6.3/examples/poly-smith.C:107:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Rand.random(tmp, Givaro::Degree(d)); data/linbox-1.6.3/examples/smith-form-kb.C:120:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/linbox-1.6.3/examples/solve.C:108:9: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (drand48() <0.5) data/linbox-1.6.3/examples/solve.C:212:9: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (drand48() <0.5) data/linbox-1.6.3/examples/solver/t-rdisolve.C:421:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ri.random(bentries[i]); data/linbox-1.6.3/examples/solver/t-rdisolve.C:427:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ri.random(Aentries[i]); data/linbox-1.6.3/examples/solver/t-rdisolve.C:489:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(entrySeed); data/linbox-1.6.3/examples/solverat.C:90:9: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (drand48() <0.5) data/linbox-1.6.3/examples/sparsesolverat.C:82:9: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (drand48() <0.5) data/linbox-1.6.3/interfaces/driver/lb-blackbox.C:137:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(B->refEntry(i,j)); data/linbox-1.6.3/interfaces/driver/lb-vector.C:144:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random((*V)[i]); data/linbox-1.6.3/linbox/algorithms/bbcharpoly.h:515:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. g.random(gamma); data/linbox-1.6.3/linbox/algorithms/blackbox-block-container-base.h:237:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(*iter_U); data/linbox-1.6.3/linbox/algorithms/blackbox-block-container-base.h:241:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(*iter_V); data/linbox-1.6.3/linbox/algorithms/blackbox-container-base.h:161:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. g.random (u[(size_t)i]); data/linbox-1.6.3/linbox/algorithms/blackbox-container.h:91:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. g.random (this->u[(size_t)i]); data/linbox-1.6.3/linbox/algorithms/blackbox-container.h:94:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. g.random (this->w[(size_t)i]); data/linbox-1.6.3/linbox/algorithms/block-wiedemann.h:121:63: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _rand.random(V.refEntry(i,j)); data/linbox-1.6.3/linbox/algorithms/block-wiedemann.h:125:63: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _rand.random(UA.refEntry(i,j)); data/linbox-1.6.3/linbox/algorithms/coppersmith-invariant-factors.h:73:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(U_); data/linbox-1.6.3/linbox/algorithms/coppersmith-invariant-factors.h:74:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(V_); data/linbox-1.6.3/linbox/algorithms/coppersmith-invariant-factors.h:83:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(U_); data/linbox-1.6.3/linbox/algorithms/coppersmith-invariant-factors.h:84:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(V_); data/linbox-1.6.3/linbox/algorithms/coppersmith.h:95:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. U.random(); data/linbox-1.6.3/linbox/algorithms/coppersmith.h:96:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. W.random(); data/linbox-1.6.3/linbox/algorithms/coppersmith.h:274:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. U.random(); data/linbox-1.6.3/linbox/algorithms/coppersmith.h:275:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. V.random(); data/linbox-1.6.3/linbox/algorithms/coppersmith.h:301:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. iter.random(*evalit); data/linbox-1.6.3/linbox/algorithms/coppersmith.h:412:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. U.random(); data/linbox-1.6.3/linbox/algorithms/coppersmith.h:413:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. V.random(); data/linbox-1.6.3/linbox/algorithms/coppersmith.h:439:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do iter.random(*evalit); while(field().isZero(*evalit)); data/linbox-1.6.3/linbox/algorithms/cra-builder-early-multip.h:94:23: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *int_p = ((size_t)lrand48()) % 20000; data/linbox-1.6.3/linbox/algorithms/cra-builder-early-multip.h:111:23: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *int_p = ((size_t)lrand48()) % 20000; data/linbox-1.6.3/linbox/algorithms/cra-builder-early-multip.h:130:23: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *int_p = ((size_t)lrand48()) % 20000; data/linbox-1.6.3/linbox/algorithms/cra-builder-early-multip.h:207:23: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *int_p = ((size_t)lrand48()) % 20000; data/linbox-1.6.3/linbox/algorithms/cra-builder-var-prec-early-multip.h:120:23: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *int_p = ((size_t)lrand48()) % 20000 - 10000; data/linbox-1.6.3/linbox/algorithms/cra-builder-var-prec-early-multip.h:142:23: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *int_p = ((size_t)lrand48()) % 20000 - 10000; data/linbox-1.6.3/linbox/algorithms/cra-builder-var-prec-early-multip.h:500:23: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *int_p = ((size_t)lrand48()) % 20000; data/linbox-1.6.3/linbox/algorithms/frobenius-large.h:83:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _RI.random(c); data/linbox-1.6.3/linbox/algorithms/frobenius-small.h:142:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _RI.random(e); data/linbox-1.6.3/linbox/algorithms/invariant-factors.h:94:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(U); data/linbox-1.6.3/linbox/algorithms/invariant-factors.h:95:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(V); data/linbox-1.6.3/linbox/algorithms/invariant-factors.h:118:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(U); data/linbox-1.6.3/linbox/algorithms/invariant-factors.h:119:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(V); data/linbox-1.6.3/linbox/algorithms/invariant-factors.h:274:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RI.random(elm); data/linbox-1.6.3/linbox/algorithms/last-invariant-factor.h:185:53: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *b_p = _gen.random();//(* b_p); data/linbox-1.6.3/linbox/algorithms/last-invariant-factor.h:189:53: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *b_p = _gen.random();//(* b_p); data/linbox-1.6.3/linbox/algorithms/lifting-container.h:757:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _rand.random(UU.refEntry(i,j)); data/linbox-1.6.3/linbox/algorithms/lifting-container.h:762:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _rand.random(V.refEntry(i,j)); data/linbox-1.6.3/linbox/algorithms/lifting-container.h:780:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _rand.random(UAp.refEntry(0,i)); data/linbox-1.6.3/linbox/algorithms/matpoly-mult.h:989:4: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int)time(NULL)); data/linbox-1.6.3/linbox/algorithms/matpoly-mult.h:1052:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int)time(NULL)); data/linbox-1.6.3/linbox/algorithms/matpoly-mult.h:1274:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int)time(NULL)); data/linbox-1.6.3/linbox/algorithms/matpoly-mult.h:1433:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int)time(NULL)); data/linbox-1.6.3/linbox/algorithms/poly-smith-form.h:253:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _RI.random(e, max_deg); data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/order-basis.h:82:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gen.random(U.ref(i,0,0)); data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-init.h:125:4: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int) time(NULL)); data/linbox-1.6.3/linbox/algorithms/polynomial-matrix/polynomial-fft-transform.h:106:4: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int) time(NULL)); data/linbox-1.6.3/linbox/algorithms/rational-cra-builder-early-multip.h:73:23: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *int_p = ((size_t)lrand48()) % 20000; data/linbox-1.6.3/linbox/algorithms/rational-cra-builder-early-multip.h:92:23: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *int_p = ((size_t)lrand48()) % 20000; data/linbox-1.6.3/linbox/algorithms/vector-fraction.h:230:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. randiter.random(A); data/linbox-1.6.3/linbox/algorithms/vector-fraction.h:285:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. randiter.random(A); data/linbox-1.6.3/linbox/blackbox/companion.h:79:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(*i); // we'll pretend p[n] == 1, ok? data/linbox-1.6.3/linbox/blackbox/companion.h:103:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(*i); // we'll pretend p[n] == 1, ok? data/linbox-1.6.3/linbox/blackbox/diagonal.h:151:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void random(); data/linbox-1.6.3/linbox/blackbox/diagonal.h:336:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Nrow.random(); data/linbox-1.6.3/linbox/blackbox/diagonal.h:349:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Ncol.random(); data/linbox-1.6.3/linbox/blackbox/diagonal.h:590:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random(); data/linbox-1.6.3/linbox/blackbox/diagonal.h:603:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. iter.random(*i); data/linbox-1.6.3/linbox/blackbox/diagonal.h:605:3: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random(); data/linbox-1.6.3/linbox/blackbox/diagonal.h:610:66: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. inline void Diagonal<_Field, VectorCategories::DenseVectorTag>::random() data/linbox-1.6.3/linbox/blackbox/diagonal.h:615:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(*i); data/linbox-1.6.3/linbox/blackbox/diagonal.h:625:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. while (field().isZero(r.random(*i))) ; data/linbox-1.6.3/linbox/blackbox/fibb.h:86:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Matrix X(Xb); X.random(); data/linbox-1.6.3/linbox/blackbox/fibb.h:102:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Matrix X(Xb); X.random(); data/linbox-1.6.3/linbox/blackbox/jit-matrix.h:168:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return _r.random(e); data/linbox-1.6.3/linbox/blackbox/permutation.h:114:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void random(unsigned int seed=(unsigned int)time(NULL)) data/linbox-1.6.3/linbox/blackbox/scalar-matrix.h:136:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. { iter.random(v_); } data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h:62:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void random() { rep_->random(); } data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h:62:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void random() { rep_->random(); } data/linbox-1.6.3/linbox/field/multimod-field.h:423:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. std::vector<double>& random(std::vector<double> &x) const data/linbox-1.6.3/linbox/field/multimod-field.h:426:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _randiter[i]->random(x[i]); data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:539:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void random() data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:542:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.random(); data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:546:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void random(const Rand&) data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:548:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return random(); data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:933:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void random(); data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:936:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void random(const T&) data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:938:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return random() ; data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:1228:83: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void BlasMatrix<Givaro::ZRing<Integer>, Vector<Givaro::ZRing<Integer>>::Dense >::random<size_t>(const size_t & b) data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:1235:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. R.random(refEntry(i,j)); data/linbox-1.6.3/linbox/matrix/plain-matrix.h:117:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Self_t& random() // set to random entries, no shape change data/linbox-1.6.3/linbox/matrix/plain-matrix.h:122:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. setEntry(i, j, r.random(x)); data/linbox-1.6.3/linbox/matrix/plain-matrix.h:199:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. using Father_t::random; data/linbox-1.6.3/linbox/matrix/random-matrix.h:108:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Matrix & random(Matrix & A) ; data/linbox-1.6.3/linbox/matrix/sliced3/dense-sliced.h:143:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. SlicedBase & random(){ // needs fix: not uniform, not full. data/linbox-1.6.3/linbox/matrix/sliced3/dense-sliced.h:483:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Sliced& random(size_t seed = 0){ data/linbox-1.6.3/linbox/matrix/sliced3/dense-sliced.h:484:12: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if(seed) srand(seed); data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h:124:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Matrix& random(Matrix &A, size_t seed=0) const { data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h:125:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return A.random(seed); data/linbox-1.6.3/linbox/randiter/abstract.h:99:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. virtual Element &random (Element &a) = 0; data/linbox-1.6.3/linbox/randiter/archetype.h:156:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element &random (Element &a) const data/linbox-1.6.3/linbox/randiter/archetype.h:158:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _randIter_ptr->random (*a._elem_ptr); data/linbox-1.6.3/linbox/randiter/envelope.h:150:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ElementAbstract &random (ElementAbstract &a) data/linbox-1.6.3/linbox/randiter/envelope.h:155:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _randIter.random(static_cast<ElementEnvelope<Field>&> (a)._elem ); data/linbox-1.6.3/linbox/randiter/generic.h:114:4: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand (_seed); data/linbox-1.6.3/linbox/randiter/generic.h:139:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element &random (Element &a) const data/linbox-1.6.3/linbox/randiter/generic.h:148:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ElementAbstract &random (ElementAbstract &a) const data/linbox-1.6.3/linbox/randiter/generic.h:152:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random (tmp); data/linbox-1.6.3/linbox/randiter/gf2.h:96:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bool &random (bool &a) const data/linbox-1.6.3/linbox/randiter/gf2.h:107:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. BitVector::reference random (BitVector::reference a) const data/linbox-1.6.3/linbox/randiter/gf2.h:117:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. stdBitReference random (stdBitReference a) const data/linbox-1.6.3/linbox/randiter/gf2.h:126:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ElementAbstract &random (ElementAbstract &a) const data/linbox-1.6.3/linbox/randiter/gf2.h:130:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random (tmp); data/linbox-1.6.3/linbox/randiter/gf2.h:135:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. uint32_t& random (uint32_t& a) const data/linbox-1.6.3/linbox/randiter/gmp-rational.h:99:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element &random (Element &a) const data/linbox-1.6.3/linbox/randiter/gmp-rational.h:107:6: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand (s); data/linbox-1.6.3/linbox/randiter/gmp-rational.h:124:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand (s); data/linbox-1.6.3/linbox/randiter/gmp-rational.h:133:6: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand (s); data/linbox-1.6.3/linbox/randiter/gmp-rational.h:155:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ElementAbstract &random (ElementAbstract &a) const data/linbox-1.6.3/linbox/randiter/gmp-rational.h:159:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random (tmp); data/linbox-1.6.3/linbox/randiter/lidia-gfq.h:100:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element& random (Element& x) const data/linbox-1.6.3/linbox/randiter/mersenne-twister.C:140:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. uint32_t random; data/linbox-1.6.3/linbox/randiter/mersenne-twister.C:168:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return start + random; data/linbox-1.6.3/linbox/randiter/modular-balanced.h:117:4: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)_seed); data/linbox-1.6.3/linbox/randiter/modular-balanced.h:157:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element &random (Element &a) const data/linbox-1.6.3/linbox/randiter/modular-balanced.h:167:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ElementAbstract &random (ElementAbstract &a) const data/linbox-1.6.3/linbox/randiter/modular-balanced.h:171:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random (tmp); data/linbox-1.6.3/linbox/randiter/modular-crooked.h:96:4: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned int)_seed); data/linbox-1.6.3/linbox/randiter/modular-crooked.h:136:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element &random (Element &a) const data/linbox-1.6.3/linbox/randiter/modular-crooked.h:145:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ElementAbstract &random (ElementAbstract &a) const data/linbox-1.6.3/linbox/randiter/modular-crooked.h:149:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random (tmp); data/linbox-1.6.3/linbox/randiter/multimod-randomprime.h:74:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. integer::random(tmp[i],_bits-1); data/linbox-1.6.3/linbox/randiter/multimod-randomprime.h:91:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. integer::random(p[i],_bits-1); data/linbox-1.6.3/linbox/randiter/ntl-zz.h:52:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element& random (Element& x) const data/linbox-1.6.3/linbox/randiter/param-fuzzy.h:85:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element &random (Element &a) const data/linbox-1.6.3/linbox/randiter/param-fuzzy.h:94:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ElementAbstract &random (ElementAbstract &a) const data/linbox-1.6.3/linbox/randiter/param-fuzzy.h:98:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random (tmp); data/linbox-1.6.3/linbox/ring/local-pir-modular.h:129:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. using Parent_t:: random; data/linbox-1.6.3/linbox/ring/ntl/ntl-gf2e.h:229:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element& random (Element& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-gf2e.h:231:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. NTL::random(x); data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_p.h:367:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. NTL::zz_p& random(NTL::zz_p& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h:165:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element& random (Element& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h:167:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. NTL::random(x); data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h:419:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element& random (Element& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h:421:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. NTL::random(x); data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pex.h:553:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element& random (Element& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pex.h:555:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. NTL::random(x, 1); data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h:606:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element& random (Element& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h:608:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. NTL::random(x, 1); data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h:612:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element& random(Element &x, size_t d) const { data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h:613:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. NTL::random(x, d + 1); data/linbox-1.6.3/linbox/ring/ntl/ntl-rr.h:324:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Element& random(Element &elt) const data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_p.h:518:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. NTL::ZZ_p& random(NTL::ZZ_p& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:341:7: [3] (random) setstate: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. is.setstate(std::istream::failbit); data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:343:8: [3] (random) setstate: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. is.setstate(std::istream::badbit); data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:422:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. NTL::ZZ_pE& random (NTL::ZZ_pE& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:424:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. NTL::random(x); data/linbox-1.6.3/linbox/solutions/det.h:231:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do iter.random (diag[i]); while (F.isZero (diag[i])); data/linbox-1.6.3/linbox/solutions/det.h:289:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do iter.random (diag[i]); while (F.isZero (diag[i])); data/linbox-1.6.3/linbox/vector/blas-vector.h:507:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void random() data/linbox-1.6.3/linbox/vector/blas-vector.h:512:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. setEntry(i, r.random(x)); data/linbox-1.6.3/linbox/vector/blas-vector.h:516:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void random( RandIter r) data/linbox-1.6.3/linbox/vector/blas-vector.h:520:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. setEntry(i, r.random(x)); data/linbox-1.6.3/linbox/vector/random.h:105:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(*iter); data/linbox-1.6.3/linbox/vector/random.h:144:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(iter->second); data/linbox-1.6.3/linbox/vector/random.h:188:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(temp); data/linbox-1.6.3/linbox/vector/stream.h:293:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _r.random (*i); data/linbox-1.6.3/linbox/vector/stream.h:402:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _r.random (*i); data/linbox-1.6.3/linbox/vector/stream.h:476:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _r.random (x); data/linbox-1.6.3/linbox/vector/stream.h:537:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _r.random (x); data/linbox-1.6.3/linbox/vector/stream.h:605:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _r.random (x); data/linbox-1.6.3/linbox/vector/vector-domain.h:547:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Vector& random(Vector& v) data/linbox-1.6.3/linbox/vector/vector-domain.h:552:54: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for (iterator p = v.begin(); p != v.end(); ++p) r.random(*p); data/linbox-1.6.3/tests/benchmark-fields.C:85:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random( a ); r.random( b ); r.random( c ); data/linbox-1.6.3/tests/benchmark-fields.C:85:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random( a ); r.random( b ); r.random( c ); data/linbox-1.6.3/tests/benchmark-fields.C:85:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random( a ); r.random( b ); r.random( c ); data/linbox-1.6.3/tests/benchmark-fields.C:88:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random( dv1[(size_t)i] ); data/linbox-1.6.3/tests/benchmark-fields.C:89:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random( dv2[(size_t)i] ); data/linbox-1.6.3/tests/benchmark-fields.C:100:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do { r.random( elements[(size_t)i] ); } data/linbox-1.6.3/tests/matrix/randomans.h:43:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time(NULL)); data/linbox-1.6.3/tests/test-blackbox-block-container.C:206:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rand.random(U.refEntry(i,j)); data/linbox-1.6.3/tests/test-blackbox-block-container.C:217:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rand.random(V.refEntry(i,j)); data/linbox-1.6.3/tests/test-blackbox.h:196:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (alpha); data/linbox-1.6.3/tests/test-blas-domain.C:162:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-blas-domain.C:262:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.random(); data/linbox-1.6.3/tests/test-blas-domain.C:263:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.random(); data/linbox-1.6.3/tests/test-blas-domain.C:264:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C.random(); data/linbox-1.6.3/tests/test-blas-domain.C:268:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(x[i]); data/linbox-1.6.3/tests/test-blas-domain.C:269:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(y[i]); data/linbox-1.6.3/tests/test-blas-domain.C:273:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(alpha); data/linbox-1.6.3/tests/test-blas-domain.C:274:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(beta); data/linbox-1.6.3/tests/test-blas-domain.C:454:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Arand.random<IMatrix>(A); data/linbox-1.6.3/tests/test-blas-domain.C:455:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Brand.random<IMatrix>(B); data/linbox-1.6.3/tests/test-blas-domain.C:456:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Crand.random<IMatrix>(C); data/linbox-1.6.3/tests/test-blas-domain.C:460:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(i,j,Integer::random()); data/linbox-1.6.3/tests/test-blas-domain.C:461:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,Integer::random()); data/linbox-1.6.3/tests/test-blas-domain.C:462:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C.setEntry(i,j,Integer::random()); data/linbox-1.6.3/tests/test-blas-domain.C:481:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. a = Integer::random<false>(ll) ; b = 1 ; data/linbox-1.6.3/tests/test-blas-domain.C:483:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. a =Integer::random<false>(ll) ; b = -1 ; data/linbox-1.6.3/tests/test-blas-domain.C:485:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. a = 1 ; b = Integer::random<false>(ll) ; data/linbox-1.6.3/tests/test-blas-domain.C:487:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. a = -1 ; b = Integer::random<false>(ll) ; data/linbox-1.6.3/tests/test-blas-domain.C:489:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. a = 0 ; b = Integer::random<false>(ll) ; data/linbox-1.6.3/tests/test-blas-domain.C:491:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. a = Integer::random<false>(ll) ; b = 0 ; data/linbox-1.6.3/tests/test-blas-domain.C:493:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. a = Integer::random<false>(ll) ; b = Integer::random<false>(ll) ; data/linbox-1.6.3/tests/test-blas-domain.C:493:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. a = Integer::random<false>(ll) ; b = Integer::random<false>(ll) ; data/linbox-1.6.3/tests/test-blas-domain.C:532:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RandMat.random(A); data/linbox-1.6.3/tests/test-blas-domain.C:533:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RandMat.random(B); data/linbox-1.6.3/tests/test-blas-domain.C:534:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RandMat.random(C); data/linbox-1.6.3/tests/test-blas-domain.C:546:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do {R.random(alpha);} while (F.isZero(alpha)); // nonzerorandom data/linbox-1.6.3/tests/test-blas-domain.C:549:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. R.random(beta); data/linbox-1.6.3/tests/test-blas-domain.C:615:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RandMat.random(A); data/linbox-1.6.3/tests/test-blas-domain.C:616:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RandMat.random(B); data/linbox-1.6.3/tests/test-blas-domain.C:734:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r = (unsigned int)((size_t)random() % n); data/linbox-1.6.3/tests/test-blas-domain.C:737:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. S.setEntry(i,i,Gn.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:739:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. S.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:747:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. L.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:748:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. L.setEntry(i,i,Gn.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:797:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(d); data/linbox-1.6.3/tests/test-blas-domain.C:806:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. S.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:813:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. L.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:873:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. S.setEntry(i,i,Gn.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:875:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. S.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:882:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. L.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:958:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:962:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. F.init(b[i],G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:966:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Au.setEntry(i,i,Gn.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:968:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Au.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:974:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Al.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:975:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Al.setEntry(i,i,Gn.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1067:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1071:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. F.init(b[i],G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1077:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. S.setEntry(i,i,Gn.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1079:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. S.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1086:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. L.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1195:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(i,j,Gn.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1198:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. F.assign(a[i],Gn.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1299:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1317:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1336:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1355:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1374:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1392:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1411:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1430:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1483:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1491:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-blas-domain.C:1591:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(tmp); data/linbox-1.6.3/tests/test-blas-domain.C:1682:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(tmp); data/linbox-1.6.3/tests/test-blas-matrix.C:49:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.random(); data/linbox-1.6.3/tests/test-blas-matrix.C:80:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-butterfly.C:323:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned int) time (NULL)); data/linbox-1.6.3/tests/test-charpoly.C:321:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-companion.C:66:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned int) time (NULL)); data/linbox-1.6.3/tests/test-cra.C:102:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. residues[i] = Integer::random(PrimeSize-1); data/linbox-1.6.3/tests/test-cra.C:175:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t resbits = 1 + (random() % (pprod.bitsize() - 1)); data/linbox-1.6.3/tests/test-cra.C:176:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Integer actual = Integer::random(resbits); data/linbox-1.6.3/tests/test-cra.C:245:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t resbits = 1 + (random() % maxbits); data/linbox-1.6.3/tests/test-cra.C:246:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Integer actual = Integer::random(resbits); data/linbox-1.6.3/tests/test-cra.C:321:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. residues[i][j] = Integer::random(PrimeSize-1); data/linbox-1.6.3/tests/test-cra.C:412:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. residues[k].setEntry( i,j,Integer::random(PrimeSize-1) ); data/linbox-1.6.3/tests/test-cra.C:506:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. residues[k][i] = Integer::random(PrimeSize-1) ; data/linbox-1.6.3/tests/test-cra.C:578:32: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Integer act_den = Integer::random(bitlen); data/linbox-1.6.3/tests/test-cra.C:581:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. num_elt = Integer::random<false>(bitlen); data/linbox-1.6.3/tests/test-cra.C:710:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. residues[k][i] = Integer::random(PrimeSize-1) ; data/linbox-1.6.3/tests/test-cra.C:864:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time(NULL)); // seeding data/linbox-1.6.3/tests/test-cradomain.C:75:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Integer::random<false>(*it, s); data/linbox-1.6.3/tests/test-dense-zero-one.C:106:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void random( Block& B) { data/linbox-1.6.3/tests/test-dense-zero-one.C:110:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(*place); data/linbox-1.6.3/tests/test-dense-zero-one.C:128:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. MD.random(B); MD.random(C); data/linbox-1.6.3/tests/test-dense-zero-one.C:128:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. MD.random(B); MD.random(C); data/linbox-1.6.3/tests/test-dense-zero-one.C:157:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. MD.random(B); MD.random(D); data/linbox-1.6.3/tests/test-dense-zero-one.C:157:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. MD.random(B); MD.random(D); data/linbox-1.6.3/tests/test-dense-zero-one.C:163:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(x); data/linbox-1.6.3/tests/test-dense-zero-one.C:208:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. MD.random(B); MD.random(D); data/linbox-1.6.3/tests/test-dense-zero-one.C:208:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. MD.random(B); MD.random(D); data/linbox-1.6.3/tests/test-dense-zero-one.C:246:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. MD.random(B); data/linbox-1.6.3/tests/test-dense-zero-one.C:255:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Block D(m,m); MD.random(D); data/linbox-1.6.3/tests/test-dense-zero-one.C:279:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. MD.random(B); data/linbox-1.6.3/tests/test-dense.C:102:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (v[(size_t)j]); data/linbox-1.6.3/tests/test-dense.C:183:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (x[(size_t)j]); data/linbox-1.6.3/tests/test-dense.C:210:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (v[(size_t)k]); data/linbox-1.6.3/tests/test-det.C:93:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do r.random (d[j]); while (F.isZero (d[j])); data/linbox-1.6.3/tests/test-det.C:182:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do r.random (d[j]); while (F.isZero (d[j])); data/linbox-1.6.3/tests/test-det.C:270:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (d[j]); data/linbox-1.6.3/tests/test-diagonal.C:326:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-dif.C:166:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (d[i]); data/linbox-1.6.3/tests/test-echelon-form.C:100:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r = (size_t)(random() % mn); data/linbox-1.6.3/tests/test-echelon-form.C:103:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. S.setEntry(i,i,Gn.random(tmp)); data/linbox-1.6.3/tests/test-echelon-form.C:105:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. S.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-echelon-form.C:113:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. L.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-echelon-form.C:114:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. L.setEntry(i,i,Gn.random(tmp)); data/linbox-1.6.3/tests/test-echelon-form.C:188:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-echelon-form.C:196:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C.setEntry(i,j,G.random(tmp)); data/linbox-1.6.3/tests/test-echelon-form.C:300:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-ffpack.C:102:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gn.random(*(S+i*n+i)); data/linbox-1.6.3/tests/test-ffpack.C:104:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(*(S+i*n+j)); data/linbox-1.6.3/tests/test-ffpack.C:113:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(*(L+i*n+j)); data/linbox-1.6.3/tests/test-ffpack.C:114:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gn.random(*(L+i*n+i)); data/linbox-1.6.3/tests/test-ffpack.C:166:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(d); data/linbox-1.6.3/tests/test-ffpack.C:181:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(*(S+i*n+j)); data/linbox-1.6.3/tests/test-ffpack.C:188:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(*(L+i*n+j)); data/linbox-1.6.3/tests/test-ffpack.C:253:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gn.random (*(B+i*m+j)); data/linbox-1.6.3/tests/test-ffpack.C:264:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gn.random (*(C+i*n+j)); data/linbox-1.6.3/tests/test-ffpack.C:397:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(tmp); data/linbox-1.6.3/tests/test-ffpack.C:506:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(tmp); data/linbox-1.6.3/tests/test-ffpack.C:572:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gn.random(*(S+i*(n+1))); data/linbox-1.6.3/tests/test-ffpack.C:574:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(*(S+i*n+j)); data/linbox-1.6.3/tests/test-ffpack.C:581:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(*(L+i*n+j)); data/linbox-1.6.3/tests/test-ffpack.C:662:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(tmp); data/linbox-1.6.3/tests/test-ffpack.C:663:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( Z2.isZero(G2.random(tmp2) ) ) data/linbox-1.6.3/tests/test-ffpack.C:673:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random(*(A+i*n+j)); data/linbox-1.6.3/tests/test-ffpack.C:707:37: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. static size_t n = 130+(size_t)(130*drand48()); data/linbox-1.6.3/tests/test-ffpack.C:708:37: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. static size_t m = 130+(size_t)(130*drand48()); data/linbox-1.6.3/tests/test-ffpack.C:736:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-ffpack.C:761:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-ffpack.C:784:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-ffpack.C:807:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-ffpack.C:829:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-ffpack.C:853:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-ffpack.C:875:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-ffpack.C:898:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-fibb.C:96:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. X.random(); data/linbox-1.6.3/tests/test-fibb.C:147:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. X.random(); data/linbox-1.6.3/tests/test-fibb.C:247:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Permutation<Field> P2(F, n, n); P2.random(); data/linbox-1.6.3/tests/test-field.h:214:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(a); data/linbox-1.6.3/tests/test-field.h:408:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (a); data/linbox-1.6.3/tests/test-field.h:461:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do r.random (a); while (F.isZero (a)); data/linbox-1.6.3/tests/test-field.h:516:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (a); data/linbox-1.6.3/tests/test-field.h:517:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (b); data/linbox-1.6.3/tests/test-field.h:518:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (c); data/linbox-1.6.3/tests/test-field.h:590:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (a); data/linbox-1.6.3/tests/test-field.h:591:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (b); data/linbox-1.6.3/tests/test-field.h:660:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (a); data/linbox-1.6.3/tests/test-field.h:661:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (b); data/linbox-1.6.3/tests/test-field.h:662:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (c); data/linbox-1.6.3/tests/test-field.h:817:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (a); data/linbox-1.6.3/tests/test-field.h:880:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (a); data/linbox-1.6.3/tests/test-field.h:881:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (b); data/linbox-1.6.3/tests/test-field.h:954:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (a); data/linbox-1.6.3/tests/test-field.h:955:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (b); data/linbox-1.6.3/tests/test-field.h:1034:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (a); r.random (b); data/linbox-1.6.3/tests/test-field.h:1034:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (a); r.random (b); data/linbox-1.6.3/tests/test-field.h:1180:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (a); data/linbox-1.6.3/tests/test-field.h:1181:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (x); data/linbox-1.6.3/tests/test-field.h:1182:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (y); data/linbox-1.6.3/tests/test-field.h:1233:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (a); data/linbox-1.6.3/tests/test-field.h:1311:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(a); r.random(b); data/linbox-1.6.3/tests/test-field.h:1311:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(a); r.random(b); data/linbox-1.6.3/tests/test-field.h:1382:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. F.convert(ix, iter.random (x)); data/linbox-1.6.3/tests/test-frobenius-large.C:115:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(seed); data/linbox-1.6.3/tests/test-frobenius-small.C:72:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(seed); data/linbox-1.6.3/tests/test-frobenius.C:74:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for ( size_t i=0; i < pdeg; ++i) r.random(plist[0][i]); data/linbox-1.6.3/tests/test-frobenius.C:79:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for ( size_t i=0; i < pdeg; ++i) r.random(plist[1][i]); data/linbox-1.6.3/tests/test-frobenius.C:84:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for ( size_t i=0; i < pdeg; ++i) r.random(plist[2][i]); data/linbox-1.6.3/tests/test-ftrmm.C:67:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t M = random()%(_LB_MAX_SZ/2) ; data/linbox-1.6.3/tests/test-ftrmm.C:68:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t N = random()%(_LB_MAX_SZ/2) ; // B is £MxN£ in a £ldb x rows£ table data/linbox-1.6.3/tests/test-ftrmm.C:69:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t ldb = random()%_LB_MAX_SZ ; data/linbox-1.6.3/tests/test-ftrmm.C:70:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t lda = random()%_LB_MAX_SZ ; data/linbox-1.6.3/tests/test-ftrmm.C:72:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. while (ldb<N) ldb = random()%_LB_MAX_SZ; // £ldb >= N£ data/linbox-1.6.3/tests/test-ftrmm.C:79:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. while (lda<K) lda = random()%_LB_MAX_SZ; // £ldba>= N£ data/linbox-1.6.3/tests/test-ftrmm.C:110:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for (size_t i = 0 ; i < rows*lda ; ++i) G.random( *(A+i) ) ; data/linbox-1.6.3/tests/test-ftrmm.C:118:45: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for (size_t i = 0 ; i < rows*ldb ; ++i) G.random( *(B+i) ) ; data/linbox-1.6.3/tests/test-ftrmm.C:128:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gn.random(alpha); data/linbox-1.6.3/tests/test-ftrmm.C:383:39: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for (size_t i = 0 ; i < K ; ++i) Gn.random(*(A+i*(lda+1))) ; // invertible diag ! data/linbox-1.6.3/tests/test-ftrmm.C:418:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t M = random()%_LB_MAX_SZ+1 ; data/linbox-1.6.3/tests/test-ftrmm.C:419:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t N = random()%_LB_MAX_SZ+1 ; data/linbox-1.6.3/tests/test-ftrmm.C:420:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t lda = random()%_LB_MAX_SZ+1 ; data/linbox-1.6.3/tests/test-ftrmm.C:441:41: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for (size_t i = 0 ; i < M*lda ; ++i) G.random( *(A+i) ) ; data/linbox-1.6.3/tests/test-ftrmm.C:447:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t r = (size_t)random()%M ; data/linbox-1.6.3/tests/test-ftrmm.C:449:52: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. P[i] = i + (size_t)((double)(M-i)*( (std::max(0.,drand48()-1e-6)))); // histoire de pas tomber sur 1... data/linbox-1.6.3/tests/test-ftrmm.C:475:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r = (size_t)random()%N ; data/linbox-1.6.3/tests/test-ftrmm.C:477:51: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Q[i] = i + (size_t)((double)(N-i)*( std::max(0.,drand48()-1e-6)) ); data/linbox-1.6.3/tests/test-ftrmm.C:510:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t M = random()%_LB_MAX_SZ+1 ; // rows of (t)A and C data/linbox-1.6.3/tests/test-ftrmm.C:511:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t N = random()%_LB_MAX_SZ+1 ; // cols of (t)B and C data/linbox-1.6.3/tests/test-ftrmm.C:512:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t K = random()%_LB_MAX_SZ+1 ; // cols of (t)A, rows of (t)B data/linbox-1.6.3/tests/test-ftrmm.C:516:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t lda = random()%(_LB_MAX_SZ/2) ; data/linbox-1.6.3/tests/test-ftrmm.C:518:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t ldb = random()%(_LB_MAX_SZ/2) ; data/linbox-1.6.3/tests/test-ftrmm.C:520:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t ldc = N+random()%(_LB_MAX_SZ/2) ; data/linbox-1.6.3/tests/test-ftrmm.C:546:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. alpha = (Element)Integer::random<false>(2); data/linbox-1.6.3/tests/test-ftrmm.C:547:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (abs(alpha) > 1.5 ) G.random(alpha); data/linbox-1.6.3/tests/test-ftrmm.C:549:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. beta = Integer::random<false>(2); data/linbox-1.6.3/tests/test-ftrmm.C:550:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (abs(beta) >1.5 ) G.random(beta); data/linbox-1.6.3/tests/test-ftrmm.C:566:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for (size_t i = 0 ; i < rowA*lda ; ++i) G.random( *(A+i) ) ; data/linbox-1.6.3/tests/test-ftrmm.C:567:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for (size_t i = 0 ; i < rowB*ldb ; ++i) G.random( *(B+i) ) ; data/linbox-1.6.3/tests/test-ftrmm.C:568:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for (size_t i = 0 ; i < rowC*ldc ; ++i) G.random( *(C+i) ) ; data/linbox-1.6.3/tests/test-ftrmm.C:654:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int)time(NULL)); data/linbox-1.6.3/tests/test-hadamard-bound.C:100:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(*seed); data/linbox-1.6.3/tests/test-hadamard-bound.C:109:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. b.random(randIter); data/linbox-1.6.3/tests/test-hilbert.C:68:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-invariant-factors.C:92:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(seed); data/linbox-1.6.3/tests/test-inverse.C:428:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (x); data/linbox-1.6.3/tests/test-inverse.C:465:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-isposdef.C:120:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-ispossemidef.C:129:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-local-smith-form-sparseelim.C:185:10: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. std::srand(seed); data/linbox-1.6.3/tests/test-local-smith-form-sparseelim.C:216:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random (L.refEntry(l,j)); data/linbox-1.6.3/tests/test-local-smith-form-sparseelim.C:228:41: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (nonzero(gen)<density) G.random ( U.refEntry(i,j) ); data/linbox-1.6.3/tests/test-local-smith-form-sparseelim.C:322:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Integer::random(iq,std::max(q,Integer(131071))); data/linbox-1.6.3/tests/test-matpoly-mult.C:65:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(v[i]); data/linbox-1.6.3/tests/test-matpoly-mult.C:72:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(m.refEntry(i,j)); data/linbox-1.6.3/tests/test-matrix-domain.h:163:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.random(); B.random(); data/linbox-1.6.3/tests/test-matrix-domain.h:163:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.random(); B.random(); data/linbox-1.6.3/tests/test-matrix-utils.h:186:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gn.random(*(B+j*m+j)); data/linbox-1.6.3/tests/test-matrix-utils.h:188:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random (*(B+i*m+j)); data/linbox-1.6.3/tests/test-matrix-utils.h:196:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gn.random (*(C+i*n+j)); data/linbox-1.6.3/tests/test-matrix-utils.h:255:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gn.random(*(B+j*m+j) ); data/linbox-1.6.3/tests/test-matrix-utils.h:257:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random (*(B+i*m+j)); data/linbox-1.6.3/tests/test-matrix-utils.h:284:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G.random (*(C+i*m+j)); data/linbox-1.6.3/tests/test-moore-penrose.C:80:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd.random (x); data/linbox-1.6.3/tests/test-moore-penrose.C:359:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-mpi-comm.C:77:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(A); data/linbox-1.6.3/tests/test-mpi-comm.C:85:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.random(RI); data/linbox-1.6.3/tests/test-mpi-comm.C:203:9: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(seed); data/linbox-1.6.3/tests/test-opencl-domain.C:127:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:128:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:177:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A_b.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:178:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:229:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:230:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B_b.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:283:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:284:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:285:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:335:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:336:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:337:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C_b.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:390:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:391:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:392:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:442:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:443:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:444:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C_b.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:497:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:498:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:499:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:549:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:550:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:551:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C_b.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:604:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:605:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:606:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:679:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:680:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:681:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. C_b.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:733:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:734:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.setEntry(k,j,G.random(tmp)); data/linbox-1.6.3/tests/test-opencl-domain.C:859:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time(NULL)); data/linbox-1.6.3/tests/test-order-basis.C:82:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Gen.random(Serie.ref(i,j,k)); data/linbox-1.6.3/tests/test-permutation.C:112:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-permutation.C:121:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. P.random(); data/linbox-1.6.3/tests/test-qlup.C:89:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. generator.random (*it); data/linbox-1.6.3/tests/test-qlup.C:193:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. generator.random (*it); data/linbox-1.6.3/tests/test-qlup.C:285:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. generator.random (*it); data/linbox-1.6.3/tests/test-qlup.C:353:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned int)rseed); data/linbox-1.6.3/tests/test-quad-matrix.C:67:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned int)time (NULL)); data/linbox-1.6.3/tests/test-randiter-nonzero-prime.C:80:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rp.random (x); data/linbox-1.6.3/tests/test-randiter-nonzero-prime.C:200:7: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. std::srand(rseed); data/linbox-1.6.3/tests/test-rank-Int.C:54:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-rank-md.C:61:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-rank-u32.C:58:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-rank.h:186:9: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (drand48()<sparsity) { data/linbox-1.6.3/tests/test-scalar-matrix.C:65:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-serialization.C:158:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RandMat.random(denseMatrix); data/linbox-1.6.3/tests/test-serialization.C:200:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(seed); data/linbox-1.6.3/tests/test-smith-form-local.C:173:7: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. std::srand(rseed); data/linbox-1.6.3/tests/test-smith-form-local.C:212:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random(e); data/linbox-1.6.3/tests/test-smith-form-local.C:213:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do { r.random(e); } while (R.isZero(e)); data/linbox-1.6.3/tests/test-solve-full.C:71:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. RDM.random(A); data/linbox-1.6.3/tests/test-solve-full.C:83:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. b.random(vectorRandIter); data/linbox-1.6.3/tests/test-solve-full.C:87:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. x.random(vectorRandIter); data/linbox-1.6.3/tests/test-sparse.C:144:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(0); data/linbox-1.6.3/tests/test-sparse.C:155:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. while (S1.field().isZero(r.random(x))); data/linbox-1.6.3/tests/test-submatrix.C:95:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (x); data/linbox-1.6.3/tests/test-sum.C:186:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r.random (d[i]); data/linbox-1.6.3/tests/test-toeplitz-det.C:70:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)time(0)); data/linbox-1.6.3/tests/test-toeplitz-det.C:89:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. randit.random(temp); data/linbox-1.6.3/tests/test-toeplitz.C:50:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _RI.random(c); data/linbox-1.6.3/tests/test-toeplitz.C:58:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _RI.random(e); data/linbox-1.6.3/tests/test-toom-cook.C:240:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. randomizer.random(A); data/linbox-1.6.3/tests/test-toom-cook.C:242:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. randomizer.random(B); data/linbox-1.6.3/tests/test-toom-cook.C:301:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. A.random((unsigned)b); data/linbox-1.6.3/tests/test-toom-cook.C:302:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. B.random((unsigned)b); data/linbox-1.6.3/tests/test-toom-cook.C:378:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. x.random(ri); data/linbox-1.6.3/tests/test-transpose.C:89:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VD.random(x); data/linbox-1.6.3/tests/test-transpose.C:96:5: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VD.random(y); data/linbox-1.6.3/tests/test-triplesbb-omp.C:391:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-triplesbb.C:92:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand ((unsigned)time (NULL)); data/linbox-1.6.3/tests/test-triplesbb.C:114:4: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. X.random(); Z.random(); data/linbox-1.6.3/tests/test-triplesbb.C:114:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. X.random(); Z.random(); data/linbox-1.6.3/tests/test-vector-domain.h:177:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do r.random (a); while (F.isZero (a)); data/linbox-1.6.3/tests/test-vector-domain.h:279:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do r.random (a); while (F.isZero (a)); data/linbox-1.6.3/tests/test-vector-domain.h:379:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. do r.random (a); while (F.isZero (a)); data/linbox-1.6.3/benchmarks/benchmark-order-basis.C:68:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (fd = open( "/proc/self/psinfo", O_RDONLY )) == -1 ) data/linbox-1.6.3/benchmarks/benchmark-order-basis.C:118:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (fp = fopen( "/proc/self/statm", "r" )) == NULL ) data/linbox-1.6.3/benchmarks/benchmark-utils.C:296:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer [80]; data/linbox-1.6.3/examples/bench-fft.C:239:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uint64_t bits =atoi(argv[1]); data/linbox-1.6.3/examples/bench-fft.C:240:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). long seed=((argc>2)?atoi(argv[2]):time(NULL)); data/linbox-1.6.3/examples/bench-new-fft.C:263:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). long seed=((argc>2)?atoi(argv[2]):time(NULL)); data/linbox-1.6.3/examples/bigmat.C:48:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int n = atoi(argv[1]); data/linbox-1.6.3/examples/blackbox/load-det.C:67:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (argc == 3) q = atoi(argv[2]); data/linbox-1.6.3/examples/blackbox/smith.C:82:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int m = atoi(argv[2]); data/linbox-1.6.3/examples/blackbox/smith.C:84:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int n = atoi(argv[3]); data/linbox-1.6.3/examples/blassolve.C:52:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). invect.open (argv[2], std::ifstream::in); data/linbox-1.6.3/examples/genprime.C:12:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). for (int i=0; i < atoi(argv[1]);i++){ data/linbox-1.6.3/examples/grid_reduce.C:67:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int S = atoi(argv[4]); data/linbox-1.6.3/examples/grid_reduce.C:105:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). mRow.open("mC2", ios::in) ; data/linbox-1.6.3/examples/grid_reduce.C:197:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in.open(src.c_str(), std::ios::in); data/linbox-1.6.3/examples/grid_reduce.C:199:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). os.open(out3.c_str(), std::ios::out); data/linbox-1.6.3/examples/grid_reduce.C:287:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in.open(src.c_str(), std::ios::in); data/linbox-1.6.3/examples/grid_reduce.C:289:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). os.open(out4.c_str(), std::ios::out); data/linbox-1.6.3/examples/grid_reduce.C:387:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in.open(src.c_str(), std::ios::in); data/linbox-1.6.3/examples/grid_reduce.C:389:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). os.open(out2.c_str(), std::ios::out); data/linbox-1.6.3/examples/mats.C:90:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int n = atoi(argv[2]); data/linbox-1.6.3/examples/nullspacebasis.C:51:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). Field F(atoi(argv[2]),argc>3?atoi(argv[3]):1); data/linbox-1.6.3/examples/nullspacebasis.C:51:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). Field F(atoi(argv[2]),argc>3?atoi(argv[3]):1); data/linbox-1.6.3/examples/nullspacebasis_rank.C:50:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int pVal = atoi(argv[2]); data/linbox-1.6.3/examples/nullspacebasis_rank.C:55:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). Field F(pVal, argc>3?atoi(argv[3]):1); data/linbox-1.6.3/examples/omp_block_rank.C:236:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned long seed = (argc>4?atoi(argv[4]):0); data/linbox-1.6.3/examples/omp_block_rank.C:255:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int nb = (argc>3 ? atoi(argv[3]) : omp_get_max_threads() ); data/linbox-1.6.3/examples/omp_block_rank.C:546:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int c = (argc>2 ? atoi(argv[2]) : 65521); data/linbox-1.6.3/examples/poly-smith.C:89:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int p = atoi(argv[1]); data/linbox-1.6.3/examples/poly-smith.C:90:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int n = atoi(argv[2]); data/linbox-1.6.3/examples/poly-smith.C:91:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int d = atoi(argv[3]); data/linbox-1.6.3/examples/power_rank.C:69:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). size_t StPr( argc>5? atoi(argv[5]): 0); data/linbox-1.6.3/examples/power_rank.C:115:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). size_t method( argc>4? atoi(argv[4]) : 0); data/linbox-1.6.3/examples/poweroftwo_ranks.C:105:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int method( argc>3? atoi(argv[3]): 0 ); data/linbox-1.6.3/examples/poweroftwo_ranks.C:108:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int exponent = atoi(argv[2]); data/linbox-1.6.3/examples/poweroftwo_ranks.C:113:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). size_t StPr( argc>4? atoi(argv[4]): 0); data/linbox-1.6.3/examples/qchar.C:172:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). size_t n = atoi(argv[1]); data/linbox-1.6.3/examples/qchar.C:379:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xstr[500]; data/linbox-1.6.3/examples/qchar.C:380:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numstr[500]; data/linbox-1.6.3/examples/qchar.C:383:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(xstr, "%100f", x); data/linbox-1.6.3/examples/qchar.C:404:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tenstr[500]; data/linbox-1.6.3/examples/rank.C:87:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uint32_t q = atoi(argv[2]); data/linbox-1.6.3/examples/samplebb.C:103:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R.init(a, -atoi(code)); data/linbox-1.6.3/examples/samplebb.C:109:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int n = atoi(code+1); data/linbox-1.6.3/examples/samplebb.C:239:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). augmentBB(L, avp[i], atoi(avp[i+1]), atoi(avp[i+2]), Z); data/linbox-1.6.3/examples/samplebb.C:239:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). augmentBB(L, avp[i], atoi(avp[i+1]), atoi(avp[i+2]), Z); data/linbox-1.6.3/examples/smith.C:108:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned long m = 1; if (argc == 4) m = atoi(argv[3]); data/linbox-1.6.3/examples/smithsparse.C:90:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned long m = atoi(argv[2]); data/linbox-1.6.3/examples/solve.C:70:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). invect.open (argv[2], std::ifstream::in); data/linbox-1.6.3/examples/solve.C:83:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). invect.open (argv[2], std::ifstream::in); data/linbox-1.6.3/examples/solve.C:93:52: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). std::cout<<"Computation is done over Z/("<<atoi(argv[ModComp])<<")"<<std::endl; data/linbox-1.6.3/examples/solver/t-rdisolve.C:152:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inA.open("td-A.txt"); data/linbox-1.6.3/examples/solver/t-rdisolve.C:160:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inb.open("td-b.txt"); data/linbox-1.6.3/examples/solver/t-rdisolve.C:497:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in.open("td-b.txt"); data/linbox-1.6.3/examples/solver/t-rdisolve.C:501:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in2.open("td-A.txt"); data/linbox-1.6.3/examples/solverat.C:67:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). invect.open (argv[2], std::ifstream::in); data/linbox-1.6.3/examples/sparsesolverat.C:59:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). invect.open (argv[2], std::ifstream::in); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:581:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char MapleStatement[100] = "rtable(1.."; data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:614:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->rowdim() ); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:615:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(MapleStatement, ",1.."); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:617:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->coldim() ); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:618:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(MapleStatement, ", subtype=Matrix, storage=sparse);"); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:639:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->rowdim() ); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:640:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(MapleStatement, ", 1.."); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:641:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->coldim() ); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:642:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(MapleStatement, ", subtype=Matrix, storage=sparse);"); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:770:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char MapleStatement[100] = "rtable(1.."; data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:801:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(MapleStatement + strlen(MapleStatement), "%d", V->size() ); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:802:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(MapleStatement, ", subtype=Vector[column], storage=sparse)"); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:818:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(MapleStatement + strlen(MapleStatement), "%d", V->size() ); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:819:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(MapleStatement, ",subtype=Vector[column], storage=sparse)"); data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:122:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[out.str().length()]; data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:202:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[out.str().length()]; data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:279:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[out.str().length()]; data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:349:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[out.str().length()]; data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:419:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[out.str().length()]; data/linbox-1.6.3/linbox/algorithms/numeric-solver-lapack.h:72:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)_IM, thedata, sizeof(double)*_m*_n); data/linbox-1.6.3/linbox/algorithms/rational-solver2.h:212:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((void*)IM, (const void*)M, sizeof(double)*(size_t)(n*n)); data/linbox-1.6.3/linbox/algorithms/rational-solver2.h:247:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((void*) r, (const void*) b, sizeof(double)*(size_t)n); data/linbox-1.6.3/linbox/blackbox/apply.h:224:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmp,ptr,sizeof(long long)); data/linbox-1.6.3/linbox/blackbox/apply.h:226:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr,&tmp,sizeof(long long)); data/linbox-1.6.3/linbox/blackbox/apply.h:235:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmp,ptr,sizeof(long long)); data/linbox-1.6.3/linbox/blackbox/apply.h:237:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr,&tmp,sizeof(long long)); data/linbox-1.6.3/linbox/blackbox/apply.h:636:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmp,bitDest,sizeof(long long)); data/linbox-1.6.3/linbox/blackbox/apply.h:638:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bitDest,&tmp,sizeof(long long)); data/linbox-1.6.3/linbox/blackbox/apply.h:751:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmp,BitDest,sizeof(long long)); data/linbox-1.6.3/linbox/blackbox/apply.h:753:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(BitDest,&tmp,sizeof(long long)); data/linbox-1.6.3/linbox/blackbox/apply.h:994:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmp,bitDest,sizeof(long long)); data/linbox-1.6.3/linbox/blackbox/apply.h:996:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bitDest,&tmp,sizeof(long long)); data/linbox-1.6.3/linbox/blackbox/zero-one.h:174:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/linbox-1.6.3/linbox/field/gmp-rational.h:647:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[65535], endc; data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain-factory.h:166:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chBuffer[256]; data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:136:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_rep, B._rep, sizeof(Entry)*_rows*_cols); data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:139:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_rep + i*_stride, B._rep + i*B._stride, sizeof(Entry)*_cols); data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:250:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(_rep[i*_stride]), perm_row, coldim()*sizeof(Entry)); data/linbox-1.6.3/linbox/util/error.h:66:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strg[max_error_string]; data/linbox-1.6.3/tests/test-dense.C:95:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/linbox-1.6.3/tests/test-dense.C:173:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/linbox-1.6.3/tests/test-solve-nonsingular.C:262:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). mat.open(file.c_str()); data/linbox-1.6.3/tests/test-solve-nonsingular.C:270:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out.open(res.c_str()); data/linbox-1.6.3/benchmarks/benchmark-example.C:212:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Mat.read(mat1); data/linbox-1.6.3/benchmarks/benchmark-order-basis.C:70:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ( read( fd, &psinfo, sizeof(psinfo) ) != sizeof(psinfo) ) data/linbox-1.6.3/benchmarks/block-coppersmith-benchmark.C:72:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). M.read(iF); data/linbox-1.6.3/benchmarks/block-coppersmith-benchmark.C:78:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). U.read(iF); data/linbox-1.6.3/benchmarks/block-coppersmith-benchmark.C:83:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). V.read(iF); data/linbox-1.6.3/benchmarks/invariant-factors-benchmark.C:162:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). M.read(iF); data/linbox-1.6.3/benchmarks/invariant-factors-benchmark.C:168:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). U.read(iF); data/linbox-1.6.3/benchmarks/invariant-factors-benchmark.C:173:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). V.read(iF); data/linbox-1.6.3/examples/athadet.C:69:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). sparseMatrix.read(input); data/linbox-1.6.3/examples/blackbox/ex-mat0.C:78:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(in_stream); data/linbox-1.6.3/examples/blackbox/example.C:147:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read (input); data/linbox-1.6.3/examples/blackbox/load-det.C:78:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read (input); // size is determined by the input. data/linbox-1.6.3/examples/blackbox/load-minpoly.C:98:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read (input); data/linbox-1.6.3/examples/blackbox/load-symmetrize.C:78:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read (input); data/linbox-1.6.3/examples/charpoly.C:118:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read (input); data/linbox-1.6.3/examples/charpoly.C:155:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). B.read (input); data/linbox-1.6.3/examples/det.C:64:34: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). DenseMatrix<Integers> A(ZZ); A.read(input); data/linbox-1.6.3/examples/det.C:84:32: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). SparseMatrix<Field> B (F); B.read(input); data/linbox-1.6.3/examples/echelon.C:56:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(input); data/linbox-1.6.3/examples/fields/ex-fields-archetype.C:60:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). K.read(std::cin,a); data/linbox-1.6.3/examples/fields/ex-fields-archetype.C:61:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). K.read(std::cin,b); data/linbox-1.6.3/examples/fields/ex-fields.C:59:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). K.read(cin,a); K.read(cin,b); data/linbox-1.6.3/examples/fields/ex-fields.C:59:20: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). K.read(cin,a); K.read(cin,b); data/linbox-1.6.3/examples/find-invariant-factors.C:52:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). M.read(iF); data/linbox-1.6.3/examples/gf3-invariant-factors.C:35:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). F.read(is,d); data/linbox-1.6.3/examples/graph-charpoly.C:86:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read (input); data/linbox-1.6.3/examples/grid_reduce.C:205:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(Z,in, mC, mR); data/linbox-1.6.3/examples/grid_reduce.C:296:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(Z,in, mR, mC); data/linbox-1.6.3/examples/grid_reduce.C:395:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(Z,in, mC, mR); data/linbox-1.6.3/examples/invariant-factors.C:73:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). M.read(iF); data/linbox-1.6.3/examples/map-sparse.h:141:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& in); data/linbox-1.6.3/examples/mats.C:353:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). M.read(cin); data/linbox-1.6.3/examples/minpoly.C:88:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). B.read (input); data/linbox-1.6.3/examples/minpoly.C:120:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). B.read (input); data/linbox-1.6.3/examples/mpidet.C:70:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(input); data/linbox-1.6.3/examples/nullspacebasis.C:53:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). B.read (input); data/linbox-1.6.3/examples/nullspacebasis_rank.C:57:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read (input); data/linbox-1.6.3/examples/qchar.C:406:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (prec < strlen(tenstr)) { data/linbox-1.6.3/examples/qchar.C:407:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int cut = strlen(tenstr)-prec; data/linbox-1.6.3/examples/qchar.C:410:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). numstr[strlen(numstr)-cut]=0;//temp round down data/linbox-1.6.3/examples/qchar.C:424:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (i >=strlen(xstr)) break; data/linbox-1.6.3/examples/qchar.C:430:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (i < strlen(xstr)) { data/linbox-1.6.3/examples/qchar.C:437:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (i < strlen(xstr)) { data/linbox-1.6.3/examples/qchar.C:445:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (i >=strlen(xstr)) break; data/linbox-1.6.3/examples/qchar.C:450:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (i < strlen(xstr)) { data/linbox-1.6.3/examples/qchar.C:456:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (i >=strlen(xstr)) break; data/linbox-1.6.3/examples/qchar.C:474:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (j >= strlen(xstr)) break; data/linbox-1.6.3/examples/qchar.C:478:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (j < strlen(xstr)) { data/linbox-1.6.3/examples/qchar.C:483:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (j >= strlen(xstr)) break; data/linbox-1.6.3/examples/qchar.C:488:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (j < strlen(xstr)) { data/linbox-1.6.3/examples/smith.C:259:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (src[0]=='-') M.read(cin); data/linbox-1.6.3/examples/smith.C:262:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). M.read(in); data/linbox-1.6.3/examples/smithsparse.C:103:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). B.read(input); data/linbox-1.6.3/examples/smithsparse.C:155:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(input); data/linbox-1.6.3/examples/solve.C:117:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). F.read(invect,*it); data/linbox-1.6.3/examples/solver/t-rdisolve.C:153:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(inA); data/linbox-1.6.3/examples/sparseelimdet.C:64:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(input); data/linbox-1.6.3/examples/sparseelimdet.C:78:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). B.read(input); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:614:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->rowdim() ); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:617:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->coldim() ); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:639:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->rowdim() ); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:641:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(MapleStatement + strlen(MapleStatement), "%d", BB->coldim() ); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:801:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(MapleStatement + strlen(MapleStatement), "%d", V->size() ); data/linbox-1.6.3/interfaces/maple-old/lbmaple.C:818:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(MapleStatement + strlen(MapleStatement), "%d", V->size() ); data/linbox-1.6.3/interfaces/maple/lb-maple-utilities.h:75:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(msg, out.str().c_str(), l); data/linbox-1.6.3/interfaces/maple/lb-maple.C:72:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(msg, out.str().c_str(), l); data/linbox-1.6.3/linbox/algorithms/block-massey-domain.h:163:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i=(int)strlen(timer); i<28; i++) data/linbox-1.6.3/linbox/algorithms/cra-builder-single.h:330:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i=strlen(title)+strlen(pref); i<28; i++) data/linbox-1.6.3/linbox/algorithms/cra-builder-single.h:330:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i=strlen(title)+strlen(pref); i<28; i++) data/linbox-1.6.3/linbox/algorithms/rational-solver.h:359:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i=strlen(title)+strlen(pref); i<28; i++) data/linbox-1.6.3/linbox/algorithms/rational-solver.h:359:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i=strlen(title)+strlen(pref); i<28; i++) data/linbox-1.6.3/linbox/algorithms/rational-solver.h:544:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i=strlen(title)+strlen(pref); i<28; i++) data/linbox-1.6.3/linbox/algorithms/rational-solver.h:544:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i=strlen(title)+strlen(pref); i<28; i++) data/linbox-1.6.3/linbox/algorithms/rational-solver.h:858:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i=strlen(title)+strlen(pref); i<28; i++) data/linbox-1.6.3/linbox/algorithms/rational-solver.h:858:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i=strlen(title)+strlen(pref); i<28; i++) data/linbox-1.6.3/linbox/algorithms/sigma-basis.h:97:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i=strlen(timer); i<28; i++) data/linbox-1.6.3/linbox/algorithms/smith-form-valence.h:87:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(input); data/linbox-1.6.3/linbox/blackbox/bb.h:48:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). virtual std::istream& read(std::istream& os) data/linbox-1.6.3/linbox/blackbox/csf.h:113:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(ms); data/linbox-1.6.3/linbox/blackbox/csf.h:249:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). void read(MatrixStream<Field> &ms) data/linbox-1.6.3/linbox/blackbox/diagonal.h:211:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& is) data/linbox-1.6.3/linbox/blackbox/fibb-product.h:45:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& is); data/linbox-1.6.3/linbox/blackbox/fibb-product.h:147:1: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(std::istream& is) data/linbox-1.6.3/linbox/blackbox/hilbert.h:124:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& is) data/linbox-1.6.3/linbox/blackbox/matrix-blackbox.h:174:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline std::istream &read (std::istream &is) data/linbox-1.6.3/linbox/blackbox/matrix-blackbox.h:175:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). { return _MD.read (is, _matA); } data/linbox-1.6.3/linbox/blackbox/permutation.h:348:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read(std::istream &os) data/linbox-1.6.3/linbox/blackbox/permutation.h:349:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). { return read(os, Tag::FileFormat::Plain); } data/linbox-1.6.3/linbox/blackbox/permutation.h:429:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read(std::istream &is, Tag::FileFormat format) data/linbox-1.6.3/linbox/blackbox/quad-matrix.h:204:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is) data/linbox-1.6.3/linbox/blackbox/scalar-matrix.h:232:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& is) { data/linbox-1.6.3/linbox/blackbox/submatrix.h:361:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream& is) data/linbox-1.6.3/linbox/blackbox/submatrix.h:364:27: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). BlasSubmatrix<Matrix>::read (is, f); data/linbox-1.6.3/linbox/blackbox/toeplitz.h:131:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). void read(std::istream & in) data/linbox-1.6.3/linbox/blackbox/transpose.h:175:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read(std::istream & is) { data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h:298:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read(std::istream &is) data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h:300:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read(std::istream &is) const data/linbox-1.6.3/linbox/blackbox/triangular-fibb.h:302:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read(std::istream &is, Tag::FileFormat format) const data/linbox-1.6.3/linbox/blackbox/zero-one.h:168:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is) data/linbox-1.6.3/linbox/blackbox/zo-gf2.h:121:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is) ; data/linbox-1.6.3/linbox/blackbox/zo.h:301:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is) data/linbox-1.6.3/linbox/field/abstract.h:491:25: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). virtual std::istream &read (std::istream &is, Element &x) const = 0; data/linbox-1.6.3/linbox/field/abstract.h:499:25: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). virtual std::istream &read(std::istream &is, Element &e) const = 0; data/linbox-1.6.3/linbox/field/archetype.h:707:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is, Element &x) const data/linbox-1.6.3/linbox/field/archetype.h:708:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). { return _field_ptr->read (is, *x._elem_ptr); } data/linbox-1.6.3/linbox/field/envelope.h:632:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream& is, ElementAbstract& x) const data/linbox-1.6.3/linbox/field/envelope.h:633:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). { return _field.read (is, static_cast<ElementEnvelope<Field>&> (x)._elem); } data/linbox-1.6.3/linbox/field/envelope.h:655:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read(istream &is, ElementAbstract &x) const data/linbox-1.6.3/linbox/field/envelope.h:657:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return _field.read(is, static_cast<ElementEnvelope<Field>&>(x)._elem); data/linbox-1.6.3/linbox/field/gf2.h:381:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is) data/linbox-1.6.3/linbox/field/gf2.h:405:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is, Element &x) const data/linbox-1.6.3/linbox/field/gf2.h:414:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is, BitVector::reference x) const data/linbox-1.6.3/linbox/field/gf2.h:423:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is, stdBitReference x) const data/linbox-1.6.3/linbox/field/gmp-rational.h:600:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is) { return is; } data/linbox-1.6.3/linbox/field/gmp-rational.h:645:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is, Element &x) const data/linbox-1.6.3/linbox/field/gmp-rational.h:843:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). field.read (is, elt); data/linbox-1.6.3/linbox/field/multimod-field.h:200:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is) { data/linbox-1.6.3/linbox/field/multimod-field.h:220:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is, Element &x) const data/linbox-1.6.3/linbox/field/param-fuzzy.h:398:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is) { return is >> _fuzz; } data/linbox-1.6.3/linbox/field/param-fuzzy.h:417:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is, Element &x) const data/linbox-1.6.3/linbox/matrix/archetype.h:124:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &file, const Field &F); data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:559:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &file); data/linbox-1.6.3/linbox/matrix/densematrix/blas-matrix.h:975:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream &file); // autodetect ? data/linbox-1.6.3/linbox/matrix/grid.h:117:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(F, in, mR, mC); data/linbox-1.6.3/linbox/matrix/grid.h:127:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). void read(Field F, std::istream& in, std::vector<int>& mR, std::vector<int>& mC) data/linbox-1.6.3/linbox/matrix/grid.h:163:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). F.read(in, x); data/linbox-1.6.3/linbox/matrix/matrixdomain/blas-matrix-domain.h:932:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline std::istream &read (std::istream &is, Matrix &A) const data/linbox-1.6.3/linbox/matrix/matrixdomain/blas-matrix-domain.h:934:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return A.read (is, field()); data/linbox-1.6.3/linbox/matrix/matrixdomain/matrix-domain.h:144:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline std::istream &read (std::istream &is, Matrix_ &A) const data/linbox-1.6.3/linbox/matrix/matrixdomain/matrix-domain.h:146:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return A.read (is, _field); data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain-factory.h:290:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t kernelLength = strlen(kernel); data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain.h:972:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline std::istream &read(std::istream &is, Matrix &A) const{ data/linbox-1.6.3/linbox/matrix/matrixdomain/opencl-domain.h:973:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return A.read (is, _F); data/linbox-1.6.3/linbox/matrix/matrixdomain/plain-domain.h:91:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). using Father_t::read; data/linbox-1.6.3/linbox/matrix/matrixdomain/plain-domain.h:222:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& in, Submatrix& A) const data/linbox-1.6.3/linbox/matrix/matrixdomain/plain-domain.h:230:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(in, a); data/linbox-1.6.3/linbox/matrix/plain-matrix.h:126:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream &is) // The matrix read must have the same shape. data/linbox-1.6.3/linbox/matrix/plain-matrix.h:187:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream &is) // Will be reshaped to match the matrix read. data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:368:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream &file, const Field& field); data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:424:36: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& DenseMat<_Element>::read (std::istream &file, const Field& field) data/linbox-1.6.3/linbox/matrix/sliced3/dense-matrix.h:431:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). field.read (file, *p); data/linbox-1.6.3/linbox/matrix/sliced3/dense-sliced.h:606:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). is.read((char *)&(*_rep), bytes); data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h:79:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). using Field::read; data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h:151:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& is, Matrix& A) const { data/linbox-1.6.3/linbox/matrix/sliced3/sliced-domain.h:158:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(is, x); data/linbox-1.6.3/linbox/matrix/slicedpolynomialmatrix/SlicedPolynomialMatrix.h:189:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &file); data/linbox-1.6.3/linbox/matrix/sparse-matrix.h:59:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return A.read (is); data/linbox-1.6.3/linbox/matrix/sparsematrix/read-write-sparse.h:136:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). static std::istream &read (Matrix &A data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-associative-vector.h:187:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-associative-vector.h:190:43: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return SparseMatrixReadHelper<Self_t>::read (*this, is data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h:501:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream &file, data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h:751:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). field().read(is,z) ; data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h:784:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). field().read(is,z) ; data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h:845:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). field().read(is,z) ; data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-implicit-matrix.h:872:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). field().read(is,z) ; data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-matrix.h:667:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream &is data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-coo-matrix.h:670:43: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return SparseMatrixReadHelper<Self_t>::read(*this,is,format); data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-csr-matrix.h:760:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream &is data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-csr-matrix.h:763:43: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return SparseMatrixReadHelper<Self_t>::read(*this,is,format); data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ell-matrix.h:706:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream &is data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ell-matrix.h:709:43: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return SparseMatrixReadHelper<Self_t>::read(*this,is,format); data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ellr-matrix.h:720:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream &is data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-ellr-matrix.h:723:43: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return SparseMatrixReadHelper<Self_t>::read(*this,is,format); data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-generic.h:270:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is, Tag::FileFormat format = Tag::FileFormat::Detect ); data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-generic.h:489:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return A.read (is); data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-hyb-matrix.h:601:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream &file, data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-hyb-matrix.h:606:20: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return reader().read(file,fmt); data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-map-map-matrix.h:137:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& in); data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-parallel-vector.h:217:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-parallel-vector.h:220:43: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return SparseMatrixReadHelper<Self_t>::read (*this, is , format); data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-sequence-vector.h:185:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &is data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-sequence-vector.h:188:43: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return SparseMatrixReadHelper<Self_t>::read (*this, is data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-tpl-matrix-omp.h:256:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& in); data/linbox-1.6.3/linbox/matrix/sparsematrix/sparse-tpl-matrix.h:77:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& in); data/linbox-1.6.3/linbox/ring/envelope.h:280:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream& is) { return FieldEnvelope<Ring>::read (is); } data/linbox-1.6.3/linbox/ring/envelope.h:280:71: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream& is) { return FieldEnvelope<Ring>::read (is); } data/linbox-1.6.3/linbox/ring/envelope.h:285:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream& is, ElementAbstract& x) const data/linbox-1.6.3/linbox/ring/envelope.h:286:34: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). { return FieldEnvelope<Ring>::read (is, x); } data/linbox-1.6.3/linbox/ring/local-pir-modular.h:133:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). using Parent_t:: read ; data/linbox-1.6.3/linbox/ring/local-pir-modular.h:136:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream& is) data/linbox-1.6.3/linbox/ring/local-pir-modular.h:137:36: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). { std::string s; return Parent_t::read(is >> s)>> s >> _irred >> s >> _exponent; } data/linbox-1.6.3/linbox/ring/ntl/ntl-gf2e.h:183:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& is, Element& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_pe.h:360:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& is, Element& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-lzz_px.h:536:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& i, Element& p) const { data/linbox-1.6.3/linbox/ring/ntl/ntl-zz.h:95:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream& in) const data/linbox-1.6.3/linbox/ring/ntl/ntl-zz.h:426:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& in, Element& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:211:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read(std::istream& is, Element& x) const data/linbox-1.6.3/linbox/ring/ntl/ntl-zz_pe.h:337:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read(std::istream &is, Element &e) const data/linbox-1.6.3/linbox/ring/pir-ntl-zz_p.h:123:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream& read (std::istream& in) { data/linbox-1.6.3/linbox/ring/pir-ntl-zz_p.h:406:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). using Father_t::read; data/linbox-1.6.3/linbox/util/error.h:48:18: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). std::strncpy(strg, msg, max_error_string); data/linbox-1.6.3/linbox/util/formats/generic-dense.h:87:25: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). this->ms->getField().read(*(this->sin),v); data/linbox-1.6.3/linbox/util/formats/maple.h:74:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen(cand) < 6 || data/linbox-1.6.3/linbox/util/formats/maple.h:190:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). this->ms->getField().read(*stin,ele); data/linbox-1.6.3/linbox/util/formats/maple.h:199:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). this->ms->getField().read(*(this->sin),ele); data/linbox-1.6.3/linbox/util/formats/matrix-market.h:154:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). this->ms->getField().read(*(this->sin),v); data/linbox-1.6.3/linbox/util/formats/sms.h:109:25: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). this->ms->getField().read(*(this->sin),v); data/linbox-1.6.3/linbox/util/formats/sparse-row.h:108:25: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). this->ms->getField().read(*(this->sin),v); data/linbox-1.6.3/linbox/vector/slicedpolynomialvector/SlicedPolynomialVector.h:165:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). std::istream &read (std::istream &file); data/linbox-1.6.3/linbox/vector/vector-domain-gf2.h:125:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline std::istream &read (std::istream &is, Vector &x) const data/linbox-1.6.3/linbox/vector/vector-domain.h:271:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline std::istream &read (std::istream &is, Vector &x) const data/linbox-1.6.3/tests/test-blackbox.h:269:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). B.read(in); data/linbox-1.6.3/tests/test-cradomain.C:174:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. bool locpass = std::equal( Res.begin(), Res.end(), iteration.getVector().begin() ); data/linbox-1.6.3/tests/test-cradomain.C:199:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. bool locpass = std::equal( Res.begin(), Res.end(), iteration.getVector().begin() ); data/linbox-1.6.3/tests/test-cradomain.C:221:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. bool locpass = std::equal( iteration.getVector().begin(), iteration.getVector().end(), Res.getWritePointer() ); data/linbox-1.6.3/tests/test-frobenius-large.C:45:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). M.read(iF); data/linbox-1.6.3/tests/test-frobenius-small.C:44:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). M.read(iF); data/linbox-1.6.3/tests/test-invariant-factors.C:57:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). M.read(iF); data/linbox-1.6.3/tests/test-smith-form-iliopoulos.C:62:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(data); data/linbox-1.6.3/tests/test-tutorial.C:61:4: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). A.read(smsin); data/linbox-1.6.3/tests/test-zero-one.C:81:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). testMatrix.read(mat_in); ANALYSIS SUMMARY: Hits = 856 Lines analyzed = 189176 in approximately 4.82 seconds (39213 lines/second) Physical Source Lines of Code (SLOC) = 109820 Hits@level = [0] 31 [1] 211 [2] 100 [3] 515 [4] 30 [5] 0 Hits@level+ = [0+] 887 [1+] 856 [2+] 645 [3+] 545 [4+] 30 [5+] 0 Hits/KSLOC@level+ = [0+] 8.07685 [1+] 7.79457 [2+] 5.87325 [3+] 4.96267 [4+] 0.273174 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.